Change log for intel-microcode package in Ubuntu
76 → 150 of 187 results | First • Previous • Next • Last |
intel-microcode (3.20191115.1ubuntu0.16.04.1) xenial-security; urgency=medium * Backport from debian unstable: - Unexpected Page Faults in Guest Virtualization Environment (SKL-188, KBL-144, CFL-136 errata) * Remaining Ubuntu changes - debian/initramfs.hook: Do not override preset defaults from auto-exported conf snippets loaded by initramfs-tools.
Available diffs
intel-microcode (3.20191115.1ubuntu0.18.04.1) bionic-security; urgency=medium * Backport from debian unstable: - Unexpected Page Faults in Guest Virtualization Environment (SKL-188, KBL-144, CFL-136 errata) * Remaining Ubuntu changes - debian/initramfs.hook: Do not override preset defaults from auto-exported conf snippets loaded by initramfs-tools.
Available diffs
intel-microcode (3.20191115.1ubuntu0.19.04.1) disco-security; urgency=medium * Backport from debian unstable: - Unexpected Page Faults in Guest Virtualization Environment (SKL-188, KBL-144, CFL-136 errata) * Remaining Ubuntu changes - debian/initramfs.hook: Do not override preset defaults from auto-exported conf snippets loaded by initramfs-tools.
Available diffs
intel-microcode (3.20191115.1ubuntu0.19.10.1) eoan-security; urgency=medium * Backport from debian unstable: - Unexpected Page Faults in Guest Virtualization Environment (SKL-188, KBL-144, CFL-136 errata) * Remaining Ubuntu changes - debian/initramfs.hook: Do not override preset defaults from auto-exported conf snippets loaded by initramfs-tools.
Available diffs
intel-microcode (3.20191112-0ubuntu0.18.04.2) bionic-security; urgency=medium * SECURITY UPDATE: New upstream microcode data release 20191112 CVE-2019-11135, CVE-2019-11139 + New Microcodes: sig 0x000406d8, pf_mask 0x01, 2019-09-16, rev 0x012d, size 84992 sig 0x00050653, pf_mask 0x97, 2019-09-09, rev 0x1000151, size 32768 sig 0x00050656, pf_mask 0xbf, 2019-09-05, rev 0x400002c, size 51200 sig 0x00060663, pf_mask 0x80, 2018-04-17, rev 0x002a, size 87040 sig 0x000706a8, pf_mask 0x01, 2019-08-29, rev 0x0016, size 74752 sig 0x000706e5, pf_mask 0x80, 2019-10-07, rev 0x004e, size 103424 sig 0x000a0660, pf_mask 0x80, 2019-08-27, rev 0x00c6, size 91136 + Updated Microcodes: sig 0x000406e3, pf_mask 0xc0, 2019-08-14, rev 0x00d4, size 101376 sig 0x00050654, pf_mask 0xb7, 2019-09-05, rev 0x2000065, size 34816 sig 0x00050657, pf_mask 0xbf, 2019-09-05, rev 0x500002c, size 51200 sig 0x000506e3, pf_mask 0x36, 2019-08-14, rev 0x00d4, size 101376 sig 0x000706a1, pf_mask 0x01, 2019-08-28, rev 0x0032, size 73728 sig 0x000806e9, pf_mask 0x10, 2019-08-14, rev 0x00c6, size 99328 sig 0x000806e9, pf_mask 0xc0, 2019-08-14, rev 0x00c6, size 100352 sig 0x000806ea, pf_mask 0xc0, 2019-08-14, rev 0x00c6, size 99328 sig 0x000806eb, pf_mask 0xd0, 2019-08-14, rev 0x00c6, size 100352 sig 0x000806ec, pf_mask 0x94, 2019-08-14, rev 0x00c6, size 100352 sig 0x000906e9, pf_mask 0x2a, 2019-04-30, rev 0x00ba, size 99328 sig 0x000906ea, pf_mask 0x22, 2019-08-14, rev 0x00c6, size 99328 sig 0x000906eb, pf_mask 0x02, 2019-08-14, rev 0x00c6, size 100352 sig 0x000906ed, pf_mask 0x22, 2019-08-14, rev 0x00c6, size 99328 * Remaining Ubuntu changes: - debian/initramfs.hook: Do not override preset defaults from auto-exported conf snippets loaded by initramfs-tools.
Available diffs
intel-microcode (3.20191112-0ubuntu0.16.04.2) xenial-security; urgency=medium * SECURITY UPDATE: New upstream microcode data release 20191112 CVE-2019-11135, CVE-2019-11139 + New Microcodes: sig 0x000406d8, pf_mask 0x01, 2019-09-16, rev 0x012d, size 84992 sig 0x00050653, pf_mask 0x97, 2019-09-09, rev 0x1000151, size 32768 sig 0x00050656, pf_mask 0xbf, 2019-09-05, rev 0x400002c, size 51200 sig 0x00060663, pf_mask 0x80, 2018-04-17, rev 0x002a, size 87040 sig 0x000706a8, pf_mask 0x01, 2019-08-29, rev 0x0016, size 74752 sig 0x000706e5, pf_mask 0x80, 2019-10-07, rev 0x004e, size 103424 sig 0x000a0660, pf_mask 0x80, 2019-08-27, rev 0x00c6, size 91136 + Updated Microcodes: sig 0x000406e3, pf_mask 0xc0, 2019-08-14, rev 0x00d4, size 101376 sig 0x00050654, pf_mask 0xb7, 2019-09-05, rev 0x2000065, size 34816 sig 0x00050657, pf_mask 0xbf, 2019-09-05, rev 0x500002c, size 51200 sig 0x000506e3, pf_mask 0x36, 2019-08-14, rev 0x00d4, size 101376 sig 0x000706a1, pf_mask 0x01, 2019-08-28, rev 0x0032, size 73728 sig 0x000806e9, pf_mask 0x10, 2019-08-14, rev 0x00c6, size 99328 sig 0x000806e9, pf_mask 0xc0, 2019-08-14, rev 0x00c6, size 100352 sig 0x000806ea, pf_mask 0xc0, 2019-08-14, rev 0x00c6, size 99328 sig 0x000806eb, pf_mask 0xd0, 2019-08-14, rev 0x00c6, size 100352 sig 0x000806ec, pf_mask 0x94, 2019-08-14, rev 0x00c6, size 100352 sig 0x000906e9, pf_mask 0x2a, 2019-04-30, rev 0x00ba, size 99328 sig 0x000906ea, pf_mask 0x22, 2019-08-14, rev 0x00c6, size 99328 sig 0x000906eb, pf_mask 0x02, 2019-08-14, rev 0x00c6, size 100352 sig 0x000906ed, pf_mask 0x22, 2019-08-14, rev 0x00c6, size 99328 * Remaining Ubuntu changes: - debian/initramfs.hook: Do not override preset defaults from auto-exported conf snippets loaded by initramfs-tools.
Available diffs
intel-microcode (3.20191112-0ubuntu0.19.04.2) disco-security; urgency=medium * SECURITY UPDATE: New upstream microcode data release 20191112 CVE-2019-11135, CVE-2019-11139 + New Microcodes: sig 0x000406d8, pf_mask 0x01, 2019-09-16, rev 0x012d, size 84992 sig 0x00050653, pf_mask 0x97, 2019-09-09, rev 0x1000151, size 32768 sig 0x00050656, pf_mask 0xbf, 2019-09-05, rev 0x400002c, size 51200 sig 0x00060663, pf_mask 0x80, 2018-04-17, rev 0x002a, size 87040 sig 0x000706a8, pf_mask 0x01, 2019-08-29, rev 0x0016, size 74752 sig 0x000706e5, pf_mask 0x80, 2019-10-07, rev 0x004e, size 103424 sig 0x000a0660, pf_mask 0x80, 2019-08-27, rev 0x00c6, size 91136 + Updated Microcodes: sig 0x000406e3, pf_mask 0xc0, 2019-08-14, rev 0x00d4, size 101376 sig 0x00050654, pf_mask 0xb7, 2019-09-05, rev 0x2000065, size 34816 sig 0x00050657, pf_mask 0xbf, 2019-09-05, rev 0x500002c, size 51200 sig 0x000506e3, pf_mask 0x36, 2019-08-14, rev 0x00d4, size 101376 sig 0x000706a1, pf_mask 0x01, 2019-08-28, rev 0x0032, size 73728 sig 0x000806e9, pf_mask 0x10, 2019-08-14, rev 0x00c6, size 99328 sig 0x000806e9, pf_mask 0xc0, 2019-08-14, rev 0x00c6, size 100352 sig 0x000806ea, pf_mask 0xc0, 2019-08-14, rev 0x00c6, size 99328 sig 0x000806eb, pf_mask 0xd0, 2019-08-14, rev 0x00c6, size 100352 sig 0x000806ec, pf_mask 0x94, 2019-08-14, rev 0x00c6, size 100352 sig 0x000906e9, pf_mask 0x2a, 2019-04-30, rev 0x00ba, size 99328 sig 0x000906ea, pf_mask 0x22, 2019-08-14, rev 0x00c6, size 99328 sig 0x000906eb, pf_mask 0x02, 2019-08-14, rev 0x00c6, size 100352 sig 0x000906ed, pf_mask 0x22, 2019-08-14, rev 0x00c6, size 99328 * Remaining Ubuntu changes: - debian/initramfs.hook: Do not override preset defaults from auto-exported conf snippets loaded by initramfs-tools.
Available diffs
intel-microcode (3.20191112-0ubuntu0.19.10.2) eoan-security; urgency=medium * SECURITY UPDATE: New upstream microcode data release 20191112 CVE-2019-11135, CVE-2019-11139 + New Microcodes: sig 0x000406d8, pf_mask 0x01, 2019-09-16, rev 0x012d, size 84992 sig 0x00050653, pf_mask 0x97, 2019-09-09, rev 0x1000151, size 32768 sig 0x00050656, pf_mask 0xbf, 2019-09-05, rev 0x400002c, size 51200 sig 0x00060663, pf_mask 0x80, 2018-04-17, rev 0x002a, size 87040 sig 0x000706a8, pf_mask 0x01, 2019-08-29, rev 0x0016, size 74752 sig 0x000706e5, pf_mask 0x80, 2019-10-07, rev 0x004e, size 103424 sig 0x000a0660, pf_mask 0x80, 2019-08-27, rev 0x00c6, size 91136 + Updated Microcodes: sig 0x000406e3, pf_mask 0xc0, 2019-08-14, rev 0x00d4, size 101376 sig 0x00050654, pf_mask 0xb7, 2019-09-05, rev 0x2000065, size 34816 sig 0x00050657, pf_mask 0xbf, 2019-09-05, rev 0x500002c, size 51200 sig 0x000506e3, pf_mask 0x36, 2019-08-14, rev 0x00d4, size 101376 sig 0x000706a1, pf_mask 0x01, 2019-08-28, rev 0x0032, size 73728 sig 0x000806e9, pf_mask 0x10, 2019-08-14, rev 0x00c6, size 99328 sig 0x000806e9, pf_mask 0xc0, 2019-08-14, rev 0x00c6, size 100352 sig 0x000806ea, pf_mask 0xc0, 2019-08-14, rev 0x00c6, size 99328 sig 0x000806eb, pf_mask 0xd0, 2019-08-14, rev 0x00c6, size 100352 sig 0x000806ec, pf_mask 0x94, 2019-08-14, rev 0x00c6, size 100352 sig 0x000906e9, pf_mask 0x2a, 2019-04-30, rev 0x00ba, size 99328 sig 0x000906ea, pf_mask 0x22, 2019-08-14, rev 0x00c6, size 99328 sig 0x000906eb, pf_mask 0x02, 2019-08-14, rev 0x00c6, size 100352 sig 0x000906ed, pf_mask 0x22, 2019-08-14, rev 0x00c6, size 99328 * Remaining Ubuntu changes: - debian/initramfs.hook: Do not override preset defaults from auto-exported conf snippets loaded by initramfs-tools. -- Steve Beattie <email address hidden> Tue, 12 Nov 2019 10:33:05 -0800
Available diffs
- diff from 3.20190514.0ubuntu0.19.10.0 (in ~mamarley/ubuntu/updates) to 3.20191112-0ubuntu0.19.10.2 (pending)
- diff from 3.20190918.1ubuntu1 to 3.20191112-0ubuntu0.19.10.2 (pending)
Superseded in focal-release |
Obsolete in eoan-release |
Deleted in eoan-proposed (Reason: moved to Release) |
intel-microcode (3.20190918.1ubuntu1) eoan; urgency=low * Merge from Debian testing. Remaining changes: - debian/initramfs.hook: Do not override preset defaults from auto-exported conf snippets loaded by initramfs-tools.
Available diffs
intel-microcode (3.20190618.0ubuntu0.14.04.1) trusty-security; urgency=medium * SECURITY UPDATE: New upstream microcode datafile 20190618 - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 + Updated Microcodes: sig 0x000206d6, pf_mask 0x6d, 2019-05-21, rev 0x061f, size 18432 sig 0x000206d7, pf_mask 0x6d, 2019-05-21, rev 0x0718, size 19456 sig 0x000506ca, pf_mask 0x03, 2019-03-01, rev 0x0016, size 15360 + Add MDS mitigation support for Sandy Bridge server and Core-X processor families.(LP: #1830123) -- Steve Beattie <email address hidden> Thu, 20 Jun 2019 06:44:56 -0700
Available diffs
intel-microcode (3.20190618.0ubuntu0.16.04.1) xenial-security; urgency=medium * SECURITY UPDATE: New upstream microcode datafile 20190618 - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 + Updated Microcodes: sig 0x000206d6, pf_mask 0x6d, 2019-05-21, rev 0x061f, size 18432 sig 0x000206d7, pf_mask 0x6d, 2019-05-21, rev 0x0718, size 19456 sig 0x000506ca, pf_mask 0x03, 2019-03-01, rev 0x0016, size 15360 + Add MDS mitigation support for Sandy Bridge server and Core-X processor families.(LP: #1830123) -- Steve Beattie <email address hidden> Thu, 20 Jun 2019 06:44:56 -0700
Available diffs
intel-microcode (3.20190618.0ubuntu0.18.04.1) bionic-security; urgency=medium * SECURITY UPDATE: New upstream microcode datafile 20190618 - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 + Updated Microcodes: sig 0x000206d6, pf_mask 0x6d, 2019-05-21, rev 0x061f, size 18432 sig 0x000206d7, pf_mask 0x6d, 2019-05-21, rev 0x0718, size 19456 sig 0x000506ca, pf_mask 0x03, 2019-03-01, rev 0x0016, size 15360 + Add MDS mitigation support for Sandy Bridge server and Core-X processor families.(LP: #1830123) -- Steve Beattie <email address hidden> Thu, 20 Jun 2019 06:44:56 -0700
Available diffs
intel-microcode (3.20190618.0ubuntu0.18.10.1) cosmic-security; urgency=medium * SECURITY UPDATE: New upstream microcode datafile 20190618 - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 + Updated Microcodes: sig 0x000206d6, pf_mask 0x6d, 2019-05-21, rev 0x061f, size 18432 sig 0x000206d7, pf_mask 0x6d, 2019-05-21, rev 0x0718, size 19456 sig 0x000506ca, pf_mask 0x03, 2019-03-01, rev 0x0016, size 15360 + Add MDS mitigation support for Sandy Bridge server and Core-X processor families.(LP: #1830123) -- Steve Beattie <email address hidden> Thu, 20 Jun 2019 06:44:56 -0700
Available diffs
intel-microcode (3.20190618.0ubuntu0.19.04.1) disco-security; urgency=medium * SECURITY UPDATE: New upstream microcode datafile 20190618 - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 + Updated Microcodes: sig 0x000206d6, pf_mask 0x6d, 2019-05-21, rev 0x061f, size 18432 sig 0x000206d7, pf_mask 0x6d, 2019-05-21, rev 0x0718, size 19456 sig 0x000506ca, pf_mask 0x03, 2019-03-01, rev 0x0016, size 15360 + Add MDS mitigation support for Sandy Bridge server and Core-X processor families.(LP: #1830123) -- Steve Beattie <email address hidden> Thu, 20 Jun 2019 06:44:56 -0700
Available diffs
intel-microcode (3.20190514.0ubuntu0.14.04.2) trusty-security; urgency=medium * Update to final 20190514 microcode update. (LP: #1829745) - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 + New Microcodes: sig 0x00030678, pf_mask 0x02, 2014.04-22, rev 0x0838, size 52224 sig 0x00030678, pf_mask 0x0c, 2014.04-22, rev 0x0838, size 52224 sig 0x00030679, pf_mask 0x0f, 2014.04-23, rev 0x090c, size 52224 sig 0x000406c3, pf_mask 0x01, 2014.04-23, rev 0x0368, size 69632 sig 0x000406c4, pf_mask 0x01, 2014.04-23, rev 0x0411, size 68608 + Add MDS mitigation support for Cherry Trail and Bay Trail processor families. [ Dimitri John Ledkov ] * Do not override preset defaults from auto-exported conf snippets loaded by initramfs-tools. This thus allows other hooks, or alternative confdir override the built-in defaults at mkinitramfs time. Specifically to support generating installer/golden/bare-metal initrds with all microcodes for any hardware. -- Steve Beattie <email address hidden> Mon, 20 May 2019 22:08:04 -0700
intel-microcode (3.20190514.0ubuntu0.16.04.2) xenial-security; urgency=medium * Update to final 20190514 microcode update. (LP: #1829745) - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 + New Microcodes: sig 0x00030678, pf_mask 0x02, 2016.04-22, rev 0x0838, size 52224 sig 0x00030678, pf_mask 0x0c, 2016.04-22, rev 0x0838, size 52224 sig 0x00030679, pf_mask 0x0f, 2016.04-23, rev 0x090c, size 52224 sig 0x000406c3, pf_mask 0x01, 2016.04-23, rev 0x0368, size 69632 sig 0x000406c4, pf_mask 0x01, 2016.04-23, rev 0x0411, size 68608 + Add MDS mitigation support for Cherry Trail and Bay Trail processor families. [ Dimitri John Ledkov ] * Do not override preset defaults from auto-exported conf snippets loaded by initramfs-tools. This thus allows other hooks, or alternative confdir override the built-in defaults at mkinitramfs time. Specifically to support generating installer/golden/bare-metal initrds with all microcodes for any hardware. -- Steve Beattie <email address hidden> Mon, 20 May 2019 22:08:04 -0700
intel-microcode (3.20190514.0ubuntu0.18.04.3) bionic-security; urgency=medium * Update to final 20190514 microcode update. (LP: #1829745) - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 + New Microcodes: sig 0x00030678, pf_mask 0x02, 2019-04-22, rev 0x0838, size 52224 sig 0x00030678, pf_mask 0x0c, 2019-04-22, rev 0x0838, size 52224 sig 0x00030679, pf_mask 0x0f, 2019-04-23, rev 0x090c, size 52224 sig 0x000406c3, pf_mask 0x01, 2019-04-23, rev 0x0368, size 69632 sig 0x000406c4, pf_mask 0x01, 2019-04-23, rev 0x0411, size 68608 + Add MDS mitigation support for Cherry Trail and Bay Trail processor families. [ Dimitri John Ledkov ] * Do not override preset defaults from auto-exported conf snippets loaded by initramfs-tools. This thus allows other hooks, or alternative confdir override the built-in defaults at mkinitramfs time. Specifically to support generating installer/golden/bare-metal initrds with all microcodes for any hardware. -- Steve Beattie <email address hidden> Mon, 20 May 2019 22:08:04 -0700
intel-microcode (3.20190514.0ubuntu0.18.10.2) cosmic-security; urgency=medium * Update to final 20190514 microcode update. (LP: #1829745) - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 + New Microcodes: sig 0x00030678, pf_mask 0x02, 2018.10-22, rev 0x0838, size 52224 sig 0x00030678, pf_mask 0x0c, 2018.10-22, rev 0x0838, size 52224 sig 0x00030679, pf_mask 0x0f, 2018.10-23, rev 0x090c, size 52224 sig 0x000406c3, pf_mask 0x01, 2018.10-23, rev 0x0368, size 69632 sig 0x000406c4, pf_mask 0x01, 2018.10-23, rev 0x0411, size 68608 + Add MDS mitigation support for Cherry Trail and Bay Trail processor families. [ Dimitri John Ledkov ] * Do not override preset defaults from auto-exported conf snippets loaded by initramfs-tools. This thus allows other hooks, or alternative confdir override the built-in defaults at mkinitramfs time. Specifically to support generating installer/golden/bare-metal initrds with all microcodes for any hardware. -- Steve Beattie <email address hidden> Mon, 20 May 2019 22:08:04 -0700
Available diffs
- diff from 3.20190514.0ubuntu0.18.10.1 (in ~ubuntu-security/ubuntu/ubuntu-security-collab) to 3.20190514.0ubuntu0.18.10.2 (2.4 KiB)
- diff from 3.20180703.2ubuntu1 to 3.20190514.0ubuntu0.18.10.2 (pending)
intel-microcode (3.20190514.0ubuntu0.19.04.3) disco-security; urgency=medium * Update to final 20190514 microcode update. (LP: #1829745) - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 + New Microcodes: sig 0x00030678, pf_mask 0x02, 2019-04-22, rev 0x0838, size 52224 sig 0x00030678, pf_mask 0x0c, 2019-04-22, rev 0x0838, size 52224 sig 0x00030679, pf_mask 0x0f, 2019-04-23, rev 0x090c, size 52224 sig 0x000406c3, pf_mask 0x01, 2019-04-23, rev 0x0368, size 69632 sig 0x000406c4, pf_mask 0x01, 2019-04-23, rev 0x0411, size 68608 + Add MDS mitigation support for Cherry Trail and Bay Trail processor families. [ Dimitri John Ledkov ] * Do not override preset defaults from auto-exported conf snippets loaded by initramfs-tools. This thus allows other hooks, or alternative confdir override the built-in defaults at mkinitramfs time. Specifically to support generating installer/golden/bare-metal initrds with all microcodes for any hardware. -- Steve Beattie <email address hidden> Mon, 20 May 2019 22:08:04 -0700
intel-microcode (3.20190514.1ubuntu1) eoan; urgency=medium * Do not override preset defaults from auto-exported conf snippets loaded by initramfs-tools. This thus allows other hooks, or alternative confdir override the built-in defaults at mkinitramfs time. Specifically to support generating installer/golden/bare-metal initrds with all microcodes for any hardware. -- Dimitri John Ledkov <email address hidden> Fri, 17 May 2019 09:56:18 +0200
Available diffs
intel-microcode (3.20190514.1) unstable; urgency=high * New upstream microcode datafile 20190514 * SECURITY UPDATE Implements MDS mitigation (RIDL, Fallout, Zombieload), INTEL-SA-00223 CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 * New Microcodes: sig 0x00030678, pf_mask 0x02, 2019-04-22, rev 0x0838, size 52224 sig 0x00030678, pf_mask 0x0c, 2019-04-22, rev 0x0838, size 52224 sig 0x00030679, pf_mask 0x0f, 2019-04-23, rev 0x090c, size 52224 sig 0x000406c3, pf_mask 0x01, 2019-04-23, rev 0x0368, size 69632 sig 0x000406c4, pf_mask 0x01, 2019-04-23, rev 0x0411, size 68608 sig 0x00050657, pf_mask 0xbf, 2019-02-27, rev 0x5000021, size 47104 * Updated Microcodes: sig 0x000206a7, pf_mask 0x12, 2019-02-17, rev 0x002f, size 12288 sig 0x000306a9, pf_mask 0x12, 2019-02-13, rev 0x0021, size 14336 sig 0x000306c3, pf_mask 0x32, 2019-02-26, rev 0x0027, size 23552 sig 0x000306d4, pf_mask 0xc0, 2019-03-07, rev 0x002d, size 19456 sig 0x000306e4, pf_mask 0xed, 2019-03-14, rev 0x042e, size 16384 sig 0x000306e7, pf_mask 0xed, 2019-03-14, rev 0x0715, size 17408 sig 0x000306f2, pf_mask 0x6f, 2019-03-01, rev 0x0043, size 34816 sig 0x000306f4, pf_mask 0x80, 2019-03-01, rev 0x0014, size 18432 sig 0x00040651, pf_mask 0x72, 2019-02-26, rev 0x0025, size 21504 sig 0x00040661, pf_mask 0x32, 2019-02-26, rev 0x001b, size 25600 sig 0x00040671, pf_mask 0x22, 2019-03-07, rev 0x0020, size 14336 sig 0x000406e3, pf_mask 0xc0, 2019-04-01, rev 0x00cc, size 100352 sig 0x000406f1, pf_mask 0xef, 2019-03-02, rev 0xb000036, size 30720 sig 0x00050654, pf_mask 0xb7, 2019-04-02, rev 0x200005e, size 32768 sig 0x00050662, pf_mask 0x10, 2019-03-23, rev 0x001a, size 32768 sig 0x00050663, pf_mask 0x10, 2019-03-23, rev 0x7000017, size 24576 sig 0x00050664, pf_mask 0x10, 2019-03-23, rev 0xf000015, size 23552 sig 0x00050665, pf_mask 0x10, 2019-03-23, rev 0xe00000d, size 19456 sig 0x000506c9, pf_mask 0x03, 2019-01-15, rev 0x0038, size 17408 sig 0x000506ca, pf_mask 0x03, 2019-03-01, rev 0x0016, size 15360 sig 0x000506e3, pf_mask 0x36, 2019-04-01, rev 0x00cc, size 100352 sig 0x000506f1, pf_mask 0x01, 2019-03-21, rev 0x002e, size 11264 sig 0x000706a1, pf_mask 0x01, 2019-01-02, rev 0x002e, size 73728 sig 0x000806e9, pf_mask 0x10, 2019-04-01, rev 0x00b4, size 98304 sig 0x000806e9, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328 sig 0x000806ea, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328 sig 0x000806eb, pf_mask 0xd0, 2019-03-30, rev 0x00b8, size 98304 sig 0x000806ec, pf_mask 0x94, 2019-03-30, rev 0x00b8, size 97280 sig 0x000906e9, pf_mask 0x2a, 2019-04-01, rev 0x00b4, size 99328 sig 0x000906ea, pf_mask 0x22, 2019-04-01, rev 0x00b4, size 98304 sig 0x000906eb, pf_mask 0x02, 2019-04-01, rev 0x00b4, size 99328 sig 0x000906ec, pf_mask 0x22, 2019-02-14, rev 0x00ae, size 98304 sig 0x000906ed, pf_mask 0x22, 2019-03-17, rev 0x00b8, size 97280 -- Henrique de Moraes Holschuh <email address hidden> Tue, 14 May 2019 21:49:08 -0300
Available diffs
intel-microcode (3.20190514.0ubuntu1) eoan; urgency=medium * SECURITY UPDATE: new upstream datafile 20190507 - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 + New Microcodes: sig 0x00050655, pf_mask 0xb7, 2018-11-16, rev 0x3000010, size 47104 sig 0x00050656, pf_mask 0xbf, 2019-01-28, rev 0x400001c, size 47104 sig 0x00050657, pf_mask 0xbf, 2019-02-27, rev 0x5000021, size 47104 + Updated Micrcodes: sig 0x000206a7, pf_mask 0x12, 2019-02-17, rev 0x002f, size 12288 sig 0x000306a9, pf_mask 0x12, 2019-02-13, rev 0x0021, size 14336 sig 0x000306c3, pf_mask 0x32, 2019-02-26, rev 0x0027, size 23552 sig 0x000306d4, pf_mask 0xc0, 2019-03-07, rev 0x002d, size 19456 sig 0x000306e4, pf_mask 0xed, 2019-03-14, rev 0x042e, size 16384 sig 0x000306e7, pf_mask 0xed, 2019-03-14, rev 0x0715, size 17408 sig 0x000306f2, pf_mask 0x6f, 2019-03-01, rev 0x0043, size 34816 sig 0x000306f4, pf_mask 0x80, 2019-03-01, rev 0x0014, size 18432 sig 0x00040651, pf_mask 0x72, 2019-02-26, rev 0x0025, size 21504 sig 0x00040661, pf_mask 0x32, 2019-02-26, rev 0x001b, size 25600 sig 0x00040671, pf_mask 0x22, 2019-03-07, rev 0x0020, size 14336 sig 0x000406e3, pf_mask 0xc0, 2019-04-01, rev 0x00cc, size 100352 sig 0x000406f1, pf_mask 0xef, 2019-03-02, rev 0xb000036, size 30720 sig 0x00050654, pf_mask 0xb7, 2019-04-02, rev 0x200005e, size 32768 sig 0x00050662, pf_mask 0x10, 2019-03-23, rev 0x001a, size 32768 sig 0x00050663, pf_mask 0x10, 2019-03-23, rev 0x7000017, size 24576 sig 0x00050664, pf_mask 0x10, 2019-03-23, rev 0xf000015, size 23552 sig 0x00050665, pf_mask 0x10, 2019-03-23, rev 0xe00000d, size 19456 sig 0x000506c9, pf_mask 0x03, 2019-01-15, rev 0x0038, size 17408 sig 0x000506e3, pf_mask 0x36, 2019-04-01, rev 0x00cc, size 100352 sig 0x000506f1, pf_mask 0x01, 2019-03-21, rev 0x002e, size 11264 sig 0x000706a1, pf_mask 0x01, 2019-01-02, rev 0x002e, size 73728 sig 0x000806e9, pf_mask 0x10, 2019-04-01, rev 0x00b4, size 98304 sig 0x000806e9, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328 sig 0x000806ea, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328 sig 0x000806eb, pf_mask 0xd0, 2019-03-30, rev 0x00b8, size 98304 sig 0x000806ec, pf_mask 0x94, 2019-03-30, rev 0x00b8, size 97280 sig 0x000906e9, pf_mask 0x2a, 2019-04-01, rev 0x00b4, size 99328 sig 0x000906ea, pf_mask 0x22, 2019-04-01, rev 0x00b4, size 98304 sig 0x000906eb, pf_mask 0x02, 2019-04-01, rev 0x00b4, size 99328 sig 0x000906ec, pf_mask 0x22, 2019-02-14, rev 0x00ae, size 98304 sig 0x000906ed, pf_mask 0x22, 2019-03-17, rev 0x00b8, size 97280 + Reinstated Microcodes: sig 0x00050653, pf_mask 0x97, 2018-01-29, rev 0x1000140, size 30720 -- Steve Beattie <email address hidden> Mon, 13 May 2019 15:52:55 -0700
Available diffs
intel-microcode (3.20190514.0ubuntu0.14.04.1) trusty-security; urgency=medium * SECURITY UPDATE: new upstream datafile 20190507 - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 + New Microcodes: sig 0x00050655, pf_mask 0xb7, 2018-11-16, rev 0x3000010, size 47104 sig 0x00050656, pf_mask 0xbf, 2019-01-28, rev 0x400001c, size 47104 sig 0x00050657, pf_mask 0xbf, 2019-02-27, rev 0x5000021, size 47104 + Updated Micrcodes: sig 0x000206a7, pf_mask 0x12, 2019-02-17, rev 0x002f, size 12288 sig 0x000306a9, pf_mask 0x12, 2019-02-13, rev 0x0021, size 14336 sig 0x000306c3, pf_mask 0x32, 2019-02-26, rev 0x0027, size 23552 sig 0x000306d4, pf_mask 0xc0, 2019-03-07, rev 0x002d, size 19456 sig 0x000306e4, pf_mask 0xed, 2019-03-14, rev 0x042e, size 16384 sig 0x000306e7, pf_mask 0xed, 2019-03-14, rev 0x0715, size 17408 sig 0x000306f2, pf_mask 0x6f, 2019-03-01, rev 0x0043, size 34816 sig 0x000306f4, pf_mask 0x80, 2019-03-01, rev 0x0014, size 18432 sig 0x00040651, pf_mask 0x72, 2019-02-26, rev 0x0025, size 21504 sig 0x00040661, pf_mask 0x32, 2019-02-26, rev 0x001b, size 25600 sig 0x00040671, pf_mask 0x22, 2019-03-07, rev 0x0020, size 14336 sig 0x000406e3, pf_mask 0xc0, 2019-04-01, rev 0x00cc, size 100352 sig 0x000406f1, pf_mask 0xef, 2019-03-02, rev 0xb000036, size 30720 sig 0x00050654, pf_mask 0xb7, 2019-04-02, rev 0x200005e, size 32768 sig 0x00050662, pf_mask 0x10, 2019-03-23, rev 0x001a, size 32768 sig 0x00050663, pf_mask 0x10, 2019-03-23, rev 0x7000017, size 24576 sig 0x00050664, pf_mask 0x10, 2019-03-23, rev 0xf000015, size 23552 sig 0x00050665, pf_mask 0x10, 2019-03-23, rev 0xe00000d, size 19456 sig 0x000506c9, pf_mask 0x03, 2019-01-15, rev 0x0038, size 17408 sig 0x000506e3, pf_mask 0x36, 2019-04-01, rev 0x00cc, size 100352 sig 0x000506f1, pf_mask 0x01, 2019-03-21, rev 0x002e, size 11264 sig 0x000706a1, pf_mask 0x01, 2019-01-02, rev 0x002e, size 73728 sig 0x000806e9, pf_mask 0x10, 2019-04-01, rev 0x00b4, size 98304 sig 0x000806e9, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328 sig 0x000806ea, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328 sig 0x000806eb, pf_mask 0xd0, 2019-03-30, rev 0x00b8, size 98304 sig 0x000806ec, pf_mask 0x94, 2019-03-30, rev 0x00b8, size 97280 sig 0x000906e9, pf_mask 0x2a, 2019-04-01, rev 0x00b4, size 99328 sig 0x000906ea, pf_mask 0x22, 2019-04-01, rev 0x00b4, size 98304 sig 0x000906eb, pf_mask 0x02, 2019-04-01, rev 0x00b4, size 99328 sig 0x000906ec, pf_mask 0x22, 2019-02-14, rev 0x00ae, size 98304 sig 0x000906ed, pf_mask 0x22, 2019-03-17, rev 0x00b8, size 97280 + Reinstated Microcodes: sig 0x00050653, pf_mask 0x97, 2018-01-29, rev 0x1000140, size 30720
intel-microcode (3.20190514.0ubuntu0.18.04.2) bionic-security; urgency=medium * SECURITY UPDATE: new upstream datafile 20190507 - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 + New Microcodes: sig 0x00050655, pf_mask 0xb7, 2018-11-16, rev 0x3000010, size 47104 sig 0x00050656, pf_mask 0xbf, 2019-01-28, rev 0x400001c, size 47104 sig 0x00050657, pf_mask 0xbf, 2019-02-27, rev 0x5000021, size 47104 + Updated Micrcodes: sig 0x000206a7, pf_mask 0x12, 2019-02-17, rev 0x002f, size 12288 sig 0x000306a9, pf_mask 0x12, 2019-02-13, rev 0x0021, size 14336 sig 0x000306c3, pf_mask 0x32, 2019-02-26, rev 0x0027, size 23552 sig 0x000306d4, pf_mask 0xc0, 2019-03-07, rev 0x002d, size 19456 sig 0x000306e4, pf_mask 0xed, 2019-03-14, rev 0x042e, size 16384 sig 0x000306e7, pf_mask 0xed, 2019-03-14, rev 0x0715, size 17408 sig 0x000306f2, pf_mask 0x6f, 2019-03-01, rev 0x0043, size 34816 sig 0x000306f4, pf_mask 0x80, 2019-03-01, rev 0x0014, size 18432 sig 0x00040651, pf_mask 0x72, 2019-02-26, rev 0x0025, size 21504 sig 0x00040661, pf_mask 0x32, 2019-02-26, rev 0x001b, size 25600 sig 0x00040671, pf_mask 0x22, 2019-03-07, rev 0x0020, size 14336 sig 0x000406e3, pf_mask 0xc0, 2019-04-01, rev 0x00cc, size 100352 sig 0x000406f1, pf_mask 0xef, 2019-03-02, rev 0xb000036, size 30720 sig 0x00050654, pf_mask 0xb7, 2019-04-02, rev 0x200005e, size 32768 sig 0x00050662, pf_mask 0x10, 2019-03-23, rev 0x001a, size 32768 sig 0x00050663, pf_mask 0x10, 2019-03-23, rev 0x7000017, size 24576 sig 0x00050664, pf_mask 0x10, 2019-03-23, rev 0xf000015, size 23552 sig 0x00050665, pf_mask 0x10, 2019-03-23, rev 0xe00000d, size 19456 sig 0x000506c9, pf_mask 0x03, 2019-01-15, rev 0x0038, size 17408 sig 0x000506e3, pf_mask 0x36, 2019-04-01, rev 0x00cc, size 100352 sig 0x000506f1, pf_mask 0x01, 2019-03-21, rev 0x002e, size 11264 sig 0x000706a1, pf_mask 0x01, 2019-01-02, rev 0x002e, size 73728 sig 0x000806e9, pf_mask 0x10, 2019-04-01, rev 0x00b4, size 98304 sig 0x000806e9, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328 sig 0x000806ea, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328 sig 0x000806eb, pf_mask 0xd0, 2019-03-30, rev 0x00b8, size 98304 sig 0x000806ec, pf_mask 0x94, 2019-03-30, rev 0x00b8, size 97280 sig 0x000906e9, pf_mask 0x2a, 2019-04-01, rev 0x00b4, size 99328 sig 0x000906ea, pf_mask 0x22, 2019-04-01, rev 0x00b4, size 98304 sig 0x000906eb, pf_mask 0x02, 2019-04-01, rev 0x00b4, size 99328 sig 0x000906ec, pf_mask 0x22, 2019-02-14, rev 0x00ae, size 98304 sig 0x000906ed, pf_mask 0x22, 2019-03-17, rev 0x00b8, size 97280 + Reinstated Microcodes: sig 0x00050653, pf_mask 0x97, 2018-01-29, rev 0x1000140, size 30720
intel-microcode (3.20190514.0ubuntu0.16.04.1) xenial-security; urgency=medium * SECURITY UPDATE: new upstream datafile 20190507 - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 + New Microcodes: sig 0x00050655, pf_mask 0xb7, 2018-11-16, rev 0x3000010, size 47104 sig 0x00050656, pf_mask 0xbf, 2019-01-28, rev 0x400001c, size 47104 sig 0x00050657, pf_mask 0xbf, 2019-02-27, rev 0x5000021, size 47104 + Updated Micrcodes: sig 0x000206a7, pf_mask 0x12, 2019-02-17, rev 0x002f, size 12288 sig 0x000306a9, pf_mask 0x12, 2019-02-13, rev 0x0021, size 14336 sig 0x000306c3, pf_mask 0x32, 2019-02-26, rev 0x0027, size 23552 sig 0x000306d4, pf_mask 0xc0, 2019-03-07, rev 0x002d, size 19456 sig 0x000306e4, pf_mask 0xed, 2019-03-14, rev 0x042e, size 16384 sig 0x000306e7, pf_mask 0xed, 2019-03-14, rev 0x0715, size 17408 sig 0x000306f2, pf_mask 0x6f, 2019-03-01, rev 0x0043, size 34816 sig 0x000306f4, pf_mask 0x80, 2019-03-01, rev 0x0014, size 18432 sig 0x00040651, pf_mask 0x72, 2019-02-26, rev 0x0025, size 21504 sig 0x00040661, pf_mask 0x32, 2019-02-26, rev 0x001b, size 25600 sig 0x00040671, pf_mask 0x22, 2019-03-07, rev 0x0020, size 14336 sig 0x000406e3, pf_mask 0xc0, 2019-04-01, rev 0x00cc, size 100352 sig 0x000406f1, pf_mask 0xef, 2019-03-02, rev 0xb000036, size 30720 sig 0x00050654, pf_mask 0xb7, 2019-04-02, rev 0x200005e, size 32768 sig 0x00050662, pf_mask 0x10, 2019-03-23, rev 0x001a, size 32768 sig 0x00050663, pf_mask 0x10, 2019-03-23, rev 0x7000017, size 24576 sig 0x00050664, pf_mask 0x10, 2019-03-23, rev 0xf000015, size 23552 sig 0x00050665, pf_mask 0x10, 2019-03-23, rev 0xe00000d, size 19456 sig 0x000506c9, pf_mask 0x03, 2019-01-15, rev 0x0038, size 17408 sig 0x000506e3, pf_mask 0x36, 2019-04-01, rev 0x00cc, size 100352 sig 0x000506f1, pf_mask 0x01, 2019-03-21, rev 0x002e, size 11264 sig 0x000706a1, pf_mask 0x01, 2019-01-02, rev 0x002e, size 73728 sig 0x000806e9, pf_mask 0x10, 2019-04-01, rev 0x00b4, size 98304 sig 0x000806e9, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328 sig 0x000806ea, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328 sig 0x000806eb, pf_mask 0xd0, 2019-03-30, rev 0x00b8, size 98304 sig 0x000806ec, pf_mask 0x94, 2019-03-30, rev 0x00b8, size 97280 sig 0x000906e9, pf_mask 0x2a, 2019-04-01, rev 0x00b4, size 99328 sig 0x000906ea, pf_mask 0x22, 2019-04-01, rev 0x00b4, size 98304 sig 0x000906eb, pf_mask 0x02, 2019-04-01, rev 0x00b4, size 99328 sig 0x000906ec, pf_mask 0x22, 2019-02-14, rev 0x00ae, size 98304 sig 0x000906ed, pf_mask 0x22, 2019-03-17, rev 0x00b8, size 97280 + Reinstated Microcodes: sig 0x00050653, pf_mask 0x97, 2018-01-29, rev 0x1000140, size 30720
intel-microcode (3.20190514.0ubuntu0.18.10.1) cosmic-security; urgency=medium * SECURITY UPDATE: new upstream datafile 20190507 - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 + New Microcodes: sig 0x00050655, pf_mask 0xb7, 2018-11-16, rev 0x3000010, size 47104 sig 0x00050656, pf_mask 0xbf, 2019-01-28, rev 0x400001c, size 47104 sig 0x00050657, pf_mask 0xbf, 2019-02-27, rev 0x5000021, size 47104 + Updated Micrcodes: sig 0x000206a7, pf_mask 0x12, 2019-02-17, rev 0x002f, size 12288 sig 0x000306a9, pf_mask 0x12, 2019-02-13, rev 0x0021, size 14336 sig 0x000306c3, pf_mask 0x32, 2019-02-26, rev 0x0027, size 23552 sig 0x000306d4, pf_mask 0xc0, 2019-03-07, rev 0x002d, size 19456 sig 0x000306e4, pf_mask 0xed, 2019-03-14, rev 0x042e, size 16384 sig 0x000306e7, pf_mask 0xed, 2019-03-14, rev 0x0715, size 17408 sig 0x000306f2, pf_mask 0x6f, 2019-03-01, rev 0x0043, size 34816 sig 0x000306f4, pf_mask 0x80, 2019-03-01, rev 0x0014, size 18432 sig 0x00040651, pf_mask 0x72, 2019-02-26, rev 0x0025, size 21504 sig 0x00040661, pf_mask 0x32, 2019-02-26, rev 0x001b, size 25600 sig 0x00040671, pf_mask 0x22, 2019-03-07, rev 0x0020, size 14336 sig 0x000406e3, pf_mask 0xc0, 2019-04-01, rev 0x00cc, size 100352 sig 0x000406f1, pf_mask 0xef, 2019-03-02, rev 0xb000036, size 30720 sig 0x00050654, pf_mask 0xb7, 2019-04-02, rev 0x200005e, size 32768 sig 0x00050662, pf_mask 0x10, 2019-03-23, rev 0x001a, size 32768 sig 0x00050663, pf_mask 0x10, 2019-03-23, rev 0x7000017, size 24576 sig 0x00050664, pf_mask 0x10, 2019-03-23, rev 0xf000015, size 23552 sig 0x00050665, pf_mask 0x10, 2019-03-23, rev 0xe00000d, size 19456 sig 0x000506c9, pf_mask 0x03, 2019-01-15, rev 0x0038, size 17408 sig 0x000506e3, pf_mask 0x36, 2019-04-01, rev 0x00cc, size 100352 sig 0x000506f1, pf_mask 0x01, 2019-03-21, rev 0x002e, size 11264 sig 0x000706a1, pf_mask 0x01, 2019-01-02, rev 0x002e, size 73728 sig 0x000806e9, pf_mask 0x10, 2019-04-01, rev 0x00b4, size 98304 sig 0x000806e9, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328 sig 0x000806ea, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328 sig 0x000806eb, pf_mask 0xd0, 2019-03-30, rev 0x00b8, size 98304 sig 0x000806ec, pf_mask 0x94, 2019-03-30, rev 0x00b8, size 97280 sig 0x000906e9, pf_mask 0x2a, 2019-04-01, rev 0x00b4, size 99328 sig 0x000906ea, pf_mask 0x22, 2019-04-01, rev 0x00b4, size 98304 sig 0x000906eb, pf_mask 0x02, 2019-04-01, rev 0x00b4, size 99328 sig 0x000906ec, pf_mask 0x22, 2019-02-14, rev 0x00ae, size 98304 sig 0x000906ed, pf_mask 0x22, 2019-03-17, rev 0x00b8, size 97280 + Reinstated Microcodes: sig 0x00050653, pf_mask 0x97, 2018-01-29, rev 0x1000140, size 30720
Available diffs
intel-microcode (3.20190514.0ubuntu0.19.04.1) disco-security; urgency=medium * SECURITY UPDATE: new upstream datafile 20190507 - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 + New Microcodes: sig 0x00050655, pf_mask 0xb7, 2018-11-16, rev 0x3000010, size 47104 sig 0x00050656, pf_mask 0xbf, 2019-01-28, rev 0x400001c, size 47104 sig 0x00050657, pf_mask 0xbf, 2019-02-27, rev 0x5000021, size 47104 + Updated Micrcodes: sig 0x000206a7, pf_mask 0x12, 2019-02-17, rev 0x002f, size 12288 sig 0x000306a9, pf_mask 0x12, 2019-02-13, rev 0x0021, size 14336 sig 0x000306c3, pf_mask 0x32, 2019-02-26, rev 0x0027, size 23552 sig 0x000306d4, pf_mask 0xc0, 2019-03-07, rev 0x002d, size 19456 sig 0x000306e4, pf_mask 0xed, 2019-03-14, rev 0x042e, size 16384 sig 0x000306e7, pf_mask 0xed, 2019-03-14, rev 0x0715, size 17408 sig 0x000306f2, pf_mask 0x6f, 2019-03-01, rev 0x0043, size 34816 sig 0x000306f4, pf_mask 0x80, 2019-03-01, rev 0x0014, size 18432 sig 0x00040651, pf_mask 0x72, 2019-02-26, rev 0x0025, size 21504 sig 0x00040661, pf_mask 0x32, 2019-02-26, rev 0x001b, size 25600 sig 0x00040671, pf_mask 0x22, 2019-03-07, rev 0x0020, size 14336 sig 0x000406e3, pf_mask 0xc0, 2019-04-01, rev 0x00cc, size 100352 sig 0x000406f1, pf_mask 0xef, 2019-03-02, rev 0xb000036, size 30720 sig 0x00050654, pf_mask 0xb7, 2019-04-02, rev 0x200005e, size 32768 sig 0x00050662, pf_mask 0x10, 2019-03-23, rev 0x001a, size 32768 sig 0x00050663, pf_mask 0x10, 2019-03-23, rev 0x7000017, size 24576 sig 0x00050664, pf_mask 0x10, 2019-03-23, rev 0xf000015, size 23552 sig 0x00050665, pf_mask 0x10, 2019-03-23, rev 0xe00000d, size 19456 sig 0x000506c9, pf_mask 0x03, 2019-01-15, rev 0x0038, size 17408 sig 0x000506e3, pf_mask 0x36, 2019-04-01, rev 0x00cc, size 100352 sig 0x000506f1, pf_mask 0x01, 2019-03-21, rev 0x002e, size 11264 sig 0x000706a1, pf_mask 0x01, 2019-01-02, rev 0x002e, size 73728 sig 0x000806e9, pf_mask 0x10, 2019-04-01, rev 0x00b4, size 98304 sig 0x000806e9, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328 sig 0x000806ea, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328 sig 0x000806eb, pf_mask 0xd0, 2019-03-30, rev 0x00b8, size 98304 sig 0x000806ec, pf_mask 0x94, 2019-03-30, rev 0x00b8, size 97280 sig 0x000906e9, pf_mask 0x2a, 2019-04-01, rev 0x00b4, size 99328 sig 0x000906ea, pf_mask 0x22, 2019-04-01, rev 0x00b4, size 98304 sig 0x000906eb, pf_mask 0x02, 2019-04-01, rev 0x00b4, size 99328 sig 0x000906ec, pf_mask 0x22, 2019-02-14, rev 0x00ae, size 98304 sig 0x000906ed, pf_mask 0x22, 2019-03-17, rev 0x00b8, size 97280 + Reinstated Microcodes: sig 0x00050653, pf_mask 0x97, 2018-01-29, rev 0x1000140, size 30720 -- Steve Beattie <email address hidden> Mon, 13 May 2019 15:59:08 -0700
Available diffs
Superseded in eoan-release |
Obsolete in disco-release |
Deleted in disco-proposed (Reason: moved to release) |
intel-microcode (3.20190312.1) unstable; urgency=medium * New upstream microcode datafile 20190312 + Removed Microcodes: sig 0x00050653, pf_mask 0x97, 2018-01-29, rev 0x1000140, size 30720 + New Microcodes: sig 0x000806e9, pf_mask 0x10, 2018-10-18, rev 0x009e, size 98304 sig 0x000806eb, pf_mask 0xd0, 2018-10-25, rev 0x00a4, size 99328 sig 0x000806ec, pf_mask 0x94, 2019-02-12, rev 0x00b2, size 98304 sig 0x000906ec, pf_mask 0x22, 2018-09-29, rev 0x00a2, size 98304 sig 0x000906ed, pf_mask 0x22, 2019-02-04, rev 0x00b0, size 97280 + Updated Microcodes: sig 0x000306f2, pf_mask 0x6f, 2018-11-20, rev 0x0041, size 34816 sig 0x000306f4, pf_mask 0x80, 2018-11-06, rev 0x0013, size 17408 sig 0x00050654, pf_mask 0xb7, 2019-01-28, rev 0x200005a, size 33792 sig 0x00050662, pf_mask 0x10, 2018-12-06, rev 0x0019, size 32768 sig 0x00050663, pf_mask 0x10, 2018-12-06, rev 0x7000016, size 23552 sig 0x00050664, pf_mask 0x10, 2018-11-17, rev 0xf000014, size 23552 sig 0x00050665, pf_mask 0x10, 2018-11-17, rev 0xe00000c, size 19456 sig 0x000506c9, pf_mask 0x03, 2018-09-14, rev 0x0036, size 17408 sig 0x000506ca, pf_mask 0x03, 2018-09-20, rev 0x0010, size 15360 sig 0x000706a1, pf_mask 0x01, 2018-09-21, rev 0x002c, size 73728 sig 0x000806e9, pf_mask 0xc0, 2018-07-16, rev 0x009a, size 98304 sig 0x000806ea, pf_mask 0xc0, 2018-10-18, rev 0x009e, size 98304 sig 0x000906e9, pf_mask 0x2a, 2018-07-16, rev 0x009a, size 98304 sig 0x000906ea, pf_mask 0x22, 2018-12-12, rev 0x00aa, size 98304 sig 0x000906eb, pf_mask 0x02, 2018-12-12, rev 0x00aa, size 99328 -- Henrique de Moraes Holschuh <email address hidden> Sat, 16 Mar 2019 21:07:54 -0300
Available diffs
- diff from 3.20180807a.2 to 3.20190312.1 (23.1 KiB)
intel-microcode (3.20180807a.2) unstable; urgency=medium * Makefile: unblacklist 0x206c2 (Westmere EP) According to <email address hidden>, on message to LP#1795594 on 2018-10-09, we can ship 0x206c2 updates without restrictions. Also, there are no reports in the field about this update causing issues (closes: #907402) (LP: #1795594) -- Henrique de Moraes Holschuh <email address hidden> Tue, 23 Oct 2018 19:52:40 -0300
Available diffs
- diff from 3.20180807a.1 to 3.20180807a.2 (1.2 KiB)
intel-microcode (3.20180807a.0ubuntu0.14.04.1) trusty-security; urgency=medium * SECURITY UPDATE: New upstream microcode update to provide L1D cache flush support to mitigate L1TF (CVE-2018-3646) - New Microcodes: sig 0x000206e6, pf_mask 0x04, 2018-05-15, rev 0x000d, size 9216 sig 0x000506c2, pf_mask 0x01, 2018-05-11, rev 0x0014, size 15360 sig 0x000506ca, pf_mask 0x03, 2018-05-11, rev 0x000c, size 14336 sig 0x000506f1, pf_mask 0x01, 2018-05-11, rev 0x0024, size 10240 - Updated Microcodes: sig 0x000106a5, pf_mask 0x03, 2018-05-11, rev 0x001d, size 12288 sig 0x000106e5, pf_mask 0x13, 2018-05-08, rev 0x000a, size 9216 sig 0x00020652, pf_mask 0x12, 2018-05-08, rev 0x0011, size 9216 sig 0x00020655, pf_mask 0x92, 2018-04-23, rev 0x0007, size 4096 sig 0x000206a7, pf_mask 0x12, 2018-04-10, rev 0x002e, size 12288 sig 0x000206f2, pf_mask 0x05, 2018-05-16, rev 0x003b, size 14336 sig 0x000306a9, pf_mask 0x12, 2018-04-10, rev 0x0020, size 13312 sig 0x000306c3, pf_mask 0x32, 2018-04-02, rev 0x0025, size 23552 sig 0x000306d4, pf_mask 0xc0, 2018-03-22, rev 0x002b, size 18432 sig 0x00040651, pf_mask 0x72, 2018-04-02, rev 0x0024, size 22528 sig 0x00040661, pf_mask 0x32, 2018-04-02, rev 0x001a, size 25600 sig 0x00040671, pf_mask 0x22, 2018-04-03, rev 0x001e, size 13312 sig 0x000406e3, pf_mask 0xc0, 2018-04-17, rev 0x00c6, size 99328 sig 0x00050662, pf_mask 0x10, 2018-05-25, rev 0x0017, size 31744 sig 0x00050663, pf_mask 0x10, 2018-04-20, rev 0x7000013, size 22528 sig 0x00050664, pf_mask 0x10, 2018-04-20, rev 0xf000012, size 22528 sig 0x000506c9, pf_mask 0x03, 2018-05-11, rev 0x0032, size 16384 sig 0x000506e3, pf_mask 0x36, 2018-04-17, rev 0x00c6, size 99328 sig 0x000706a1, pf_mask 0x01, 2018-05-22, rev 0x0028, size 73728 sig 0x000806e9, pf_mask 0xc0, 2018-03-24, rev 0x008e, size 98304 sig 0x000806ea, pf_mask 0xc0, 2018-05-15, rev 0x0096, size 98304 sig 0x000906e9, pf_mask 0x2a, 2018-03-24, rev 0x008e, size 98304 sig 0x000906ea, pf_mask 0x22, 2018-05-02, rev 0x0096, size 97280 sig 0x000906eb, pf_mask 0x02, 2018-03-24, rev 0x008e, size 98304 - Added back upstream but blacklisted by packaging due to the issues around addressing Intel SA-00030: sig 0x000206c2, pf_mask 0x03, 2018-05-08, rev 0x001f, size 11264 * Remaining changes from Debian: - debian/initramfs.hook: Default to early instead of auto, and install all of the microcode, not just the one matching the current CPU, if MODULES=most is set in the initramfs-tools config
intel-microcode (3.20180807a.0ubuntu0.16.04.1) xenial-security; urgency=medium * SECURITY UPDATE: New upstream microcode update to provide L1D cache flush support to mitigate L1TF (CVE-2018-3646) - New Microcodes: sig 0x000206e6, pf_mask 0x04, 2018-05-15, rev 0x000d, size 9216 sig 0x000506c2, pf_mask 0x01, 2018-05-11, rev 0x0014, size 15360 sig 0x000506ca, pf_mask 0x03, 2018-05-11, rev 0x000c, size 14336 sig 0x000506f1, pf_mask 0x01, 2018-05-11, rev 0x0024, size 10240 - Updated Microcodes: sig 0x000106a5, pf_mask 0x03, 2018-05-11, rev 0x001d, size 12288 sig 0x000106e5, pf_mask 0x13, 2018-05-08, rev 0x000a, size 9216 sig 0x00020652, pf_mask 0x12, 2018-05-08, rev 0x0011, size 9216 sig 0x00020655, pf_mask 0x92, 2018-04-23, rev 0x0007, size 4096 sig 0x000206a7, pf_mask 0x12, 2018-04-10, rev 0x002e, size 12288 sig 0x000206f2, pf_mask 0x05, 2018-05-16, rev 0x003b, size 14336 sig 0x000306a9, pf_mask 0x12, 2018-04-10, rev 0x0020, size 13312 sig 0x000306c3, pf_mask 0x32, 2018-04-02, rev 0x0025, size 23552 sig 0x000306d4, pf_mask 0xc0, 2018-03-22, rev 0x002b, size 18432 sig 0x00040651, pf_mask 0x72, 2018-04-02, rev 0x0024, size 22528 sig 0x00040661, pf_mask 0x32, 2018-04-02, rev 0x001a, size 25600 sig 0x00040671, pf_mask 0x22, 2018-04-03, rev 0x001e, size 13312 sig 0x000406e3, pf_mask 0xc0, 2018-04-17, rev 0x00c6, size 99328 sig 0x00050662, pf_mask 0x10, 2018-05-25, rev 0x0017, size 31744 sig 0x00050663, pf_mask 0x10, 2018-04-20, rev 0x7000013, size 22528 sig 0x00050664, pf_mask 0x10, 2018-04-20, rev 0xf000012, size 22528 sig 0x000506c9, pf_mask 0x03, 2018-05-11, rev 0x0032, size 16384 sig 0x000506e3, pf_mask 0x36, 2018-04-17, rev 0x00c6, size 99328 sig 0x000706a1, pf_mask 0x01, 2018-05-22, rev 0x0028, size 73728 sig 0x000806e9, pf_mask 0xc0, 2018-03-24, rev 0x008e, size 98304 sig 0x000806ea, pf_mask 0xc0, 2018-05-15, rev 0x0096, size 98304 sig 0x000906e9, pf_mask 0x2a, 2018-03-24, rev 0x008e, size 98304 sig 0x000906ea, pf_mask 0x22, 2018-05-02, rev 0x0096, size 97280 sig 0x000906eb, pf_mask 0x02, 2018-03-24, rev 0x008e, size 98304 - Added back upstream but blacklisted by packaging due to the issues around addressing Intel SA-00030: sig 0x000206c2, pf_mask 0x03, 2018-05-08, rev 0x001f, size 11264 * Remaining changes from Debian: - debian/initramfs.hook: Default to early instead of auto, and install all of the microcode, not just the one matching the current CPU, if MODULES=most is set in the initramfs-tools config
intel-microcode (3.20180807a.0ubuntu0.18.04.1) bionic-security; urgency=medium * SECURITY UPDATE: New upstream microcode update to provide L1D cache flush support to mitigate L1TF (CVE-2018-3646) - New Microcodes: sig 0x000206e6, pf_mask 0x04, 2018-05-15, rev 0x000d, size 9216 sig 0x000506c2, pf_mask 0x01, 2018-05-11, rev 0x0014, size 15360 sig 0x000506ca, pf_mask 0x03, 2018-05-11, rev 0x000c, size 14336 sig 0x000506f1, pf_mask 0x01, 2018-05-11, rev 0x0024, size 10240 - Updated Microcodes: sig 0x000106a5, pf_mask 0x03, 2018-05-11, rev 0x001d, size 12288 sig 0x000106e5, pf_mask 0x13, 2018-05-08, rev 0x000a, size 9216 sig 0x00020652, pf_mask 0x12, 2018-05-08, rev 0x0011, size 9216 sig 0x00020655, pf_mask 0x92, 2018-04-23, rev 0x0007, size 4096 sig 0x000206a7, pf_mask 0x12, 2018-04-10, rev 0x002e, size 12288 sig 0x000206f2, pf_mask 0x05, 2018-05-16, rev 0x003b, size 14336 sig 0x000306a9, pf_mask 0x12, 2018-04-10, rev 0x0020, size 13312 sig 0x000306c3, pf_mask 0x32, 2018-04-02, rev 0x0025, size 23552 sig 0x000306d4, pf_mask 0xc0, 2018-03-22, rev 0x002b, size 18432 sig 0x00040651, pf_mask 0x72, 2018-04-02, rev 0x0024, size 22528 sig 0x00040661, pf_mask 0x32, 2018-04-02, rev 0x001a, size 25600 sig 0x00040671, pf_mask 0x22, 2018-04-03, rev 0x001e, size 13312 sig 0x000406e3, pf_mask 0xc0, 2018-04-17, rev 0x00c6, size 99328 sig 0x00050662, pf_mask 0x10, 2018-05-25, rev 0x0017, size 31744 sig 0x00050663, pf_mask 0x10, 2018-04-20, rev 0x7000013, size 22528 sig 0x00050664, pf_mask 0x10, 2018-04-20, rev 0xf000012, size 22528 sig 0x000506c9, pf_mask 0x03, 2018-05-11, rev 0x0032, size 16384 sig 0x000506e3, pf_mask 0x36, 2018-04-17, rev 0x00c6, size 99328 sig 0x000706a1, pf_mask 0x01, 2018-05-22, rev 0x0028, size 73728 sig 0x000806e9, pf_mask 0xc0, 2018-03-24, rev 0x008e, size 98304 sig 0x000806ea, pf_mask 0xc0, 2018-05-15, rev 0x0096, size 98304 sig 0x000906e9, pf_mask 0x2a, 2018-03-24, rev 0x008e, size 98304 sig 0x000906ea, pf_mask 0x22, 2018-05-02, rev 0x0096, size 97280 sig 0x000906eb, pf_mask 0x02, 2018-03-24, rev 0x008e, size 98304 - Added back upstream but blacklisted by packaging due to the issues around addressing Intel SA-00030: sig 0x000206c2, pf_mask 0x03, 2018-05-08, rev 0x001f, size 11264 * Remaining changes from Debian: - debian/initramfs.hook: Default to early instead of auto, and install all of the microcode, not just the one matching the current CPU, if MODULES=most is set in the initramfs-tools config
Superseded in disco-release |
Obsolete in cosmic-release |
Deleted in cosmic-proposed (Reason: moved to release) |
intel-microcode (3.20180807a.1) unstable; urgency=high [ Henrique de Moraes Holschuh ] * New upstream microcode datafile 20180807a (closes: #906158, #906160, #903135, #903141) + New Microcodes: sig 0x000206c2, pf_mask 0x03, 2018-05-08, rev 0x001f, size 11264 sig 0x000206e6, pf_mask 0x04, 2018-05-15, rev 0x000d, size 9216 sig 0x000506c2, pf_mask 0x01, 2018-05-11, rev 0x0014, size 15360 sig 0x000506ca, pf_mask 0x03, 2018-05-11, rev 0x000c, size 14336 sig 0x000506f1, pf_mask 0x01, 2018-05-11, rev 0x0024, size 10240 + Updated Microcodes: sig 0x000106a5, pf_mask 0x03, 2018-05-11, rev 0x001d, size 12288 sig 0x000106e5, pf_mask 0x13, 2018-05-08, rev 0x000a, size 9216 sig 0x00020652, pf_mask 0x12, 2018-05-08, rev 0x0011, size 9216 sig 0x00020655, pf_mask 0x92, 2018-04-23, rev 0x0007, size 4096 sig 0x000206a7, pf_mask 0x12, 2018-04-10, rev 0x002e, size 12288 sig 0x000206f2, pf_mask 0x05, 2018-05-16, rev 0x003b, size 14336 sig 0x000306a9, pf_mask 0x12, 2018-04-10, rev 0x0020, size 13312 sig 0x000306c3, pf_mask 0x32, 2018-04-02, rev 0x0025, size 23552 sig 0x000306d4, pf_mask 0xc0, 2018-03-22, rev 0x002b, size 18432 sig 0x00040651, pf_mask 0x72, 2018-04-02, rev 0x0024, size 22528 sig 0x00040661, pf_mask 0x32, 2018-04-02, rev 0x001a, size 25600 sig 0x00040671, pf_mask 0x22, 2018-04-03, rev 0x001e, size 13312 sig 0x000406e3, pf_mask 0xc0, 2018-04-17, rev 0x00c6, size 99328 sig 0x00050662, pf_mask 0x10, 2018-05-25, rev 0x0017, size 31744 sig 0x00050663, pf_mask 0x10, 2018-04-20, rev 0x7000013, size 22528 sig 0x00050664, pf_mask 0x10, 2018-04-20, rev 0xf000012, size 22528 sig 0x000506c9, pf_mask 0x03, 2018-05-11, rev 0x0032, size 16384 sig 0x000506e3, pf_mask 0x36, 2018-04-17, rev 0x00c6, size 99328 sig 0x000706a1, pf_mask 0x01, 2018-05-22, rev 0x0028, size 73728 sig 0x000806e9, pf_mask 0xc0, 2018-03-24, rev 0x008e, size 98304 sig 0x000806ea, pf_mask 0xc0, 2018-05-15, rev 0x0096, size 98304 sig 0x000906e9, pf_mask 0x2a, 2018-03-24, rev 0x008e, size 98304 sig 0x000906ea, pf_mask 0x22, 2018-05-02, rev 0x0096, size 97280 sig 0x000906eb, pf_mask 0x02, 2018-03-24, rev 0x008e, size 98304 + Implements L1D_FLUSH support (L1TF "Foreshadow/-NG" mitigation) Intel SA-00161, CVE-2018-3615, CVE-2018-3620, CVE-2018-3646 + Implements SSBD support (Spectre v4 mitigation), Disable speculation for (some) RDMSR/WRMSR (Spectre v3a fix) Intel SA-00115, CVE-2018-3639, CVE-2018-3640 + Implements IBRS/IBPB/STIPB support, Spectre v2 mitigation for older processors with signatures 0x106a5, 0x106e5, 0x20652, 0x20655. Intel SA-0088, CVE-2017-5753, CVE-2017-5754 * source: update symlinks to reflect id of the latest release, 20180807a * debian/intel-microcode.docs: ship license and releasenote upstream files. * debian/changelog: update entry for 3.20180703.1 with L1TF information [ Julian Andres Klode ] * initramfs: include all microcode for MODULES=most. Default to early instead of auto, and install all of the microcode, not just the one matching the current CPU, if MODULES=most is set in the initramfs-tools config (LP: #1778738) -- Henrique de Moraes Holschuh <email address hidden> Fri, 24 Aug 2018 08:53:53 -0300
Available diffs
intel-microcode (3.20180703.2ubuntu1) cosmic; urgency=low * Merge from Debian unstable. Remaining changes: - debian/initramfs.hook: Default to early instead of auto, and install all of the microcode, not just the one matching the current CPU, if MODULES=most is set in the initramfs-tools config
Available diffs
intel-microcode (3.20180425.1~ubuntu0.18.04.2) bionic; urgency=medium * Default to early instead of auto, and install all of the microcode, not just the one matching the current CPU, if MODULES=most is set in the initramfs-tools config (LP: #1778738) -- Julian Andres Klode <email address hidden> Tue, 26 Jun 2018 16:31:30 +0200
Obsolete in artful-proposed |
intel-microcode (3.20180425.1~ubuntu0.17.10.2) artful; urgency=medium * Default to early instead of auto, and install all of the microcode, not just the one matching the current CPU, if MODULES=most is set in the initramfs-tools config (LP: #1778738) -- Julian Andres Klode <email address hidden> Tue, 26 Jun 2018 16:31:30 +0200
Available diffs
intel-microcode (3.20180425.1~ubuntu0.16.04.2) xenial; urgency=medium * Default to early instead of auto, and install all of the microcode, not just the one matching the current CPU, if MODULES=most is set in the initramfs-tools config (LP: #1778738) -- Julian Andres Klode <email address hidden> Tue, 26 Jun 2018 16:31:30 +0200
intel-microcode (3.20180425.1~ubuntu0.14.04.2) trusty; urgency=medium * Default to early instead of auto, and install all of the microcode, not just the one matching the current CPU, if MODULES=most is set in the initramfs-tools config (LP: #1778738) -- Julian Andres Klode <email address hidden> Tue, 26 Jun 2018 16:31:30 +0200
intel-microcode (3.20180425.1ubuntu1) cosmic; urgency=medium * Default to early instead of auto, and install all of the microcode, not just the one matching the current CPU, if MODULES=most is set in the initramfs-tools config (LP: #1778738) -- Julian Andres Klode <email address hidden> Tue, 26 Jun 2018 16:31:30 +0200
Available diffs
intel-microcode (3.20180425.1~ubuntu0.14.04.1) trusty-security; urgency=medium * SECURITY UPDATE: New upstream microcode data file 20180425 to provide IBRS/IBPB/STIBP microcode support for Spectre variant 2 mitigation for Pentium Silver N/J5xxx, Celeron N/J4xxx (sig 0x000706a1) and Xeon E5/E7 v4; Core i7-69xx/68xx (sig 0x000406f1) (LP: #1769043) - merge from Debian.
Available diffs
intel-microcode (3.20180425.1~ubuntu0.16.04.1) xenial-security; urgency=medium * SECURITY UPDATE: New upstream microcode data file 20180425 to provide IBRS/IBPB/STIBP microcode support for Spectre variant 2 mitigation for Pentium Silver N/J5xxx, Celeron N/J4xxx (sig 0x000706a1) and Xeon E5/E7 v4; Core i7-69xx/68xx (sig 0x000406f1) (LP: #1769043) - merge from Debian.
Available diffs
intel-microcode (3.20180425.1~ubuntu0.17.10.1) artful-security; urgency=medium * SECURITY UPDATE: New upstream microcode data file 20180425 to provide IBRS/IBPB/STIBP microcode support for Spectre variant 2 mitigation for Pentium Silver N/J5xxx, Celeron N/J4xxx (sig 0x000706a1) and Xeon E5/E7 v4; Core i7-69xx/68xx (sig 0x000406f1) (LP: #1769043) - merge from Debian.
Available diffs
Superseded in cosmic-release |
Deleted in cosmic-proposed (Reason: moved to release) |
Superseded in bionic-updates |
Superseded in bionic-security |
intel-microcode (3.20180425.1~ubuntu0.18.04.1) bionic-security; urgency=medium * SECURITY UPDATE: New upstream microcode data file 20180425 to provide IBRS/IBPB/STIBP microcode support for Spectre variant 2 mitigation for Pentium Silver N/J5xxx, Celeron N/J4xxx (sig 0x000706a1) and Xeon E5/E7 v4; Core i7-69xx/68xx (sig 0x000406f1) (LP: #1769043) - merge from Debian.
Available diffs
Superseded in cosmic-release |
Published in bionic-release |
Deleted in bionic-proposed (Reason: moved to release) |
intel-microcode (3.20180312.0~ubuntu18.04.1) bionic; urgency=medium * SECURITY UPDATE: New upstream microcode data file 20180312 to provide IBRS/IBPB/STIBP microcode support for Spectre variant 2 mitigation - New Microcodes: sig 0x00050653, pf mask 0x97, 2018-01-29, rev 0x1000140, size 30720 sig 0x00050665, pf mask 0x10, 2018-01-22, rev 0xe000009, size 18432 - Updated Microcodes: sig 0x000206a7, pf mask 0x12, 2018-02-07, rev 0x002d, size 12288 sig 0x000206d6, pf mask 0x6d, 2018-01-30, rev 0x061c, size 18432 sig 0x000206d7, pf mask 0x6d, 2018-01-26, rev 0x0713, size 19456 sig 0x000306a9, pf mask 0x12, 2018-02-07, rev 0x001f, size 13312 sig 0x000306c3, pf mask 0x32, 2018-01-21, rev 0x0024, size 23552 sig 0x000306d4, pf mask 0xc0, 2018-01-18, rev 0x002a, size 18432 sig 0x000306e4, pf mask 0xed, 2018-01-25, rev 0x042c, size 15360 sig 0x000306e7, pf mask 0xed, 2018-02-16, rev 0x0713, size 16384 sig 0x000306f2, pf mask 0x6f, 2018-01-19, rev 0x003c, size 33792 sig 0x000306f4, pf mask 0x80, 2018-01-22, rev 0x0011, size 17408 sig 0x00040651, pf mask 0x72, 2018-01-18, rev 0x0023, size 21504 sig 0x00040661, pf mask 0x32, 2018-01-21, rev 0x0019, size 25600 sig 0x00040671, pf mask 0x22, 2018-01-21, rev 0x001d, size 12288 sig 0x000406e3, pf mask 0xc0, 2017-11-16, rev 0x00c2, size 99328 sig 0x00050654, pf mask 0xb7, 2018-01-26, rev 0x2000043, size 28672 sig 0x00050662, pf mask 0x10, 2018-01-22, rev 0x0015, size 31744 sig 0x00050663, pf mask 0x10, 2018-01-22, rev 0x7000012, size 22528 sig 0x00050664, pf mask 0x10, 2018-01-22, rev 0xf000011, size 22528 sig 0x000506e3, pf mask 0x36, 2017-11-16, rev 0x00c2, size 99328 sig 0x000806e9, pf mask 0xc0, 2018-01-21, rev 0x0084, size 98304 sig 0x000806ea, pf mask 0xc0, 2018-01-21, rev 0x0084, size 97280 sig 0x000906e9, pf mask 0x2a, 2018-01-21, rev 0x0084, size 98304 sig 0x000906ea, pf mask 0x22, 2018-01-21, rev 0x0084, size 96256 sig 0x000906eb, pf mask 0x02, 2018-01-21, rev 0x0084, size 98304 - CVE-2017-5715 -- Tyler Hicks <email address hidden> Tue, 13 Mar 2018 20:10:18 +0000
Available diffs
intel-microcode (3.20180312.0~ubuntu17.10.1) artful-security; urgency=medium * SECURITY UPDATE: New upstream microcode data file 20180312 to provide IBRS/IBPB/STIBP microcode support for Spectre variant 2 mitigation - New Microcodes: sig 0x00050653, pf mask 0x97, 2018-01-29, rev 0x1000140, size 30720 sig 0x00050665, pf mask 0x10, 2018-01-22, rev 0xe000009, size 18432 - Updated Microcodes: sig 0x000206a7, pf mask 0x12, 2018-02-07, rev 0x002d, size 12288 sig 0x000206d6, pf mask 0x6d, 2018-01-30, rev 0x061c, size 18432 sig 0x000206d7, pf mask 0x6d, 2018-01-26, rev 0x0713, size 19456 sig 0x000306a9, pf mask 0x12, 2018-02-07, rev 0x001f, size 13312 sig 0x000306c3, pf mask 0x32, 2018-01-21, rev 0x0024, size 23552 sig 0x000306d4, pf mask 0xc0, 2018-01-18, rev 0x002a, size 18432 sig 0x000306e4, pf mask 0xed, 2018-01-25, rev 0x042c, size 15360 sig 0x000306e7, pf mask 0xed, 2018-02-16, rev 0x0713, size 16384 sig 0x000306f2, pf mask 0x6f, 2018-01-19, rev 0x003c, size 33792 sig 0x000306f4, pf mask 0x80, 2018-01-22, rev 0x0011, size 17408 sig 0x00040651, pf mask 0x72, 2018-01-18, rev 0x0023, size 21504 sig 0x00040661, pf mask 0x32, 2018-01-21, rev 0x0019, size 25600 sig 0x00040671, pf mask 0x22, 2018-01-21, rev 0x001d, size 12288 sig 0x000406e3, pf mask 0xc0, 2017-11-16, rev 0x00c2, size 99328 sig 0x00050654, pf mask 0xb7, 2018-01-26, rev 0x2000043, size 28672 sig 0x00050662, pf mask 0x10, 2018-01-22, rev 0x0015, size 31744 sig 0x00050663, pf mask 0x10, 2018-01-22, rev 0x7000012, size 22528 sig 0x00050664, pf mask 0x10, 2018-01-22, rev 0xf000011, size 22528 sig 0x000506e3, pf mask 0x36, 2017-11-16, rev 0x00c2, size 99328 sig 0x000806e9, pf mask 0xc0, 2018-01-21, rev 0x0084, size 98304 sig 0x000806ea, pf mask 0xc0, 2018-01-21, rev 0x0084, size 97280 sig 0x000906e9, pf mask 0x2a, 2018-01-21, rev 0x0084, size 98304 sig 0x000906ea, pf mask 0x22, 2018-01-21, rev 0x0084, size 96256 sig 0x000906eb, pf mask 0x02, 2018-01-21, rev 0x0084, size 98304 - CVE-2017-5715 -- Tyler Hicks <email address hidden> Tue, 13 Mar 2018 20:10:18 +0000
Available diffs
intel-microcode (3.20180312.0~ubuntu16.04.1) xenial-security; urgency=medium * SECURITY UPDATE: New upstream microcode data file 20180312 to provide IBRS/IBPB/STIBP microcode support for Spectre variant 2 mitigation - New Microcodes: sig 0x00050653, pf mask 0x97, 2018-01-29, rev 0x1000140, size 30720 sig 0x00050665, pf mask 0x10, 2018-01-22, rev 0xe000009, size 18432 - Updated Microcodes: sig 0x000206a7, pf mask 0x12, 2018-02-07, rev 0x002d, size 12288 sig 0x000206d6, pf mask 0x6d, 2018-01-30, rev 0x061c, size 18432 sig 0x000206d7, pf mask 0x6d, 2018-01-26, rev 0x0713, size 19456 sig 0x000306a9, pf mask 0x12, 2018-02-07, rev 0x001f, size 13312 sig 0x000306c3, pf mask 0x32, 2018-01-21, rev 0x0024, size 23552 sig 0x000306d4, pf mask 0xc0, 2018-01-18, rev 0x002a, size 18432 sig 0x000306e4, pf mask 0xed, 2018-01-25, rev 0x042c, size 15360 sig 0x000306e7, pf mask 0xed, 2018-02-16, rev 0x0713, size 16384 sig 0x000306f2, pf mask 0x6f, 2018-01-19, rev 0x003c, size 33792 sig 0x000306f4, pf mask 0x80, 2018-01-22, rev 0x0011, size 17408 sig 0x00040651, pf mask 0x72, 2018-01-18, rev 0x0023, size 21504 sig 0x00040661, pf mask 0x32, 2018-01-21, rev 0x0019, size 25600 sig 0x00040671, pf mask 0x22, 2018-01-21, rev 0x001d, size 12288 sig 0x000406e3, pf mask 0xc0, 2017-11-16, rev 0x00c2, size 99328 sig 0x00050654, pf mask 0xb7, 2018-01-26, rev 0x2000043, size 28672 sig 0x00050662, pf mask 0x10, 2018-01-22, rev 0x0015, size 31744 sig 0x00050663, pf mask 0x10, 2018-01-22, rev 0x7000012, size 22528 sig 0x00050664, pf mask 0x10, 2018-01-22, rev 0xf000011, size 22528 sig 0x000506e3, pf mask 0x36, 2017-11-16, rev 0x00c2, size 99328 sig 0x000806e9, pf mask 0xc0, 2018-01-21, rev 0x0084, size 98304 sig 0x000806ea, pf mask 0xc0, 2018-01-21, rev 0x0084, size 97280 sig 0x000906e9, pf mask 0x2a, 2018-01-21, rev 0x0084, size 98304 sig 0x000906ea, pf mask 0x22, 2018-01-21, rev 0x0084, size 96256 sig 0x000906eb, pf mask 0x02, 2018-01-21, rev 0x0084, size 98304 - CVE-2017-5715 -- Tyler Hicks <email address hidden> Tue, 13 Mar 2018 20:10:18 +0000
Available diffs
intel-microcode (3.20180312.0~ubuntu14.04.1) trusty-security; urgency=medium * SECURITY UPDATE: New upstream microcode data file 20180312 to provide IBRS/IBPB/STIBP microcode support for Spectre variant 2 mitigation - New Microcodes: sig 0x00050653, pf mask 0x97, 2018-01-29, rev 0x1000140, size 30720 sig 0x00050665, pf mask 0x10, 2018-01-22, rev 0xe000009, size 18432 - Updated Microcodes: sig 0x000206a7, pf mask 0x12, 2018-02-07, rev 0x002d, size 12288 sig 0x000206d6, pf mask 0x6d, 2018-01-30, rev 0x061c, size 18432 sig 0x000206d7, pf mask 0x6d, 2018-01-26, rev 0x0713, size 19456 sig 0x000306a9, pf mask 0x12, 2018-02-07, rev 0x001f, size 13312 sig 0x000306c3, pf mask 0x32, 2018-01-21, rev 0x0024, size 23552 sig 0x000306d4, pf mask 0xc0, 2018-01-18, rev 0x002a, size 18432 sig 0x000306e4, pf mask 0xed, 2018-01-25, rev 0x042c, size 15360 sig 0x000306e7, pf mask 0xed, 2018-02-16, rev 0x0713, size 16384 sig 0x000306f2, pf mask 0x6f, 2018-01-19, rev 0x003c, size 33792 sig 0x000306f4, pf mask 0x80, 2018-01-22, rev 0x0011, size 17408 sig 0x00040651, pf mask 0x72, 2018-01-18, rev 0x0023, size 21504 sig 0x00040661, pf mask 0x32, 2018-01-21, rev 0x0019, size 25600 sig 0x00040671, pf mask 0x22, 2018-01-21, rev 0x001d, size 12288 sig 0x000406e3, pf mask 0xc0, 2017-11-16, rev 0x00c2, size 99328 sig 0x00050654, pf mask 0xb7, 2018-01-26, rev 0x2000043, size 28672 sig 0x00050662, pf mask 0x10, 2018-01-22, rev 0x0015, size 31744 sig 0x00050663, pf mask 0x10, 2018-01-22, rev 0x7000012, size 22528 sig 0x00050664, pf mask 0x10, 2018-01-22, rev 0xf000011, size 22528 sig 0x000506e3, pf mask 0x36, 2017-11-16, rev 0x00c2, size 99328 sig 0x000806e9, pf mask 0xc0, 2018-01-21, rev 0x0084, size 98304 sig 0x000806ea, pf mask 0xc0, 2018-01-21, rev 0x0084, size 97280 sig 0x000906e9, pf mask 0x2a, 2018-01-21, rev 0x0084, size 98304 sig 0x000906ea, pf mask 0x22, 2018-01-21, rev 0x0084, size 96256 sig 0x000906eb, pf mask 0x02, 2018-01-21, rev 0x0084, size 98304 - CVE-2017-5715 -- Tyler Hicks <email address hidden> Tue, 13 Mar 2018 20:10:18 +0000
Available diffs
intel-microcode (3.20180108.1+really20171117.1) unstable; urgency=critical * Revert to release 20171117, as per Intel instructions issued to the public in 2018-01-22 (closes: #886998) * This effectively removes IBRS/IBPB/STIPB microcode support for Spectre variant 2 mitigation. -- Henrique de Moraes Holschuh <email address hidden> Mon, 22 Jan 2018 23:01:59 -0200
Available diffs
intel-microcode (3.20180108.0+really20170707ubuntu14.04.1) trusty-security; urgency=medium * Revert to 20170707 version of microcode because of regressions on certain hardware. (LP: #1742933) -- Marc Deslauriers <email address hidden> Mon, 22 Jan 2018 07:21:24 -0500
Available diffs
intel-microcode (3.20180108.0+really20170707ubuntu17.10.1) artful-security; urgency=medium * Revert to 20170707 version of microcode because of regressions on certain hardware. (LP: #1742933) -- Marc Deslauriers <email address hidden> Mon, 22 Jan 2018 07:16:40 -0500
Available diffs
intel-microcode (3.20180108.0+really20170707ubuntu16.04.1) xenial-security; urgency=medium * Revert to 20170707 version of microcode because of regressions on certain hardware. (LP: #1742933) -- Marc Deslauriers <email address hidden> Mon, 22 Jan 2018 07:19:36 -0500
Available diffs
intel-microcode (3.20180108.1) unstable; urgency=high * New upstream microcode data file 20180108 (closes: #886367) + Updated Microcodes: sig 0x000306c3, pf_mask 0x32, 2017-11-20, rev 0x0023, size 23552 sig 0x000306d4, pf_mask 0xc0, 2017-11-17, rev 0x0028, size 18432 sig 0x000306e4, pf_mask 0xed, 2017-12-01, rev 0x042a, size 15360 sig 0x000306f2, pf_mask 0x6f, 2017-11-17, rev 0x003b, size 33792 sig 0x000306f4, pf_mask 0x80, 2017-11-17, rev 0x0010, size 17408 sig 0x00040651, pf_mask 0x72, 2017-11-20, rev 0x0021, size 22528 sig 0x00040661, pf_mask 0x32, 2017-11-20, rev 0x0018, size 25600 sig 0x00040671, pf_mask 0x22, 2017-11-17, rev 0x001b, size 13312 sig 0x000406e3, pf_mask 0xc0, 2017-11-16, rev 0x00c2, size 99328 sig 0x00050654, pf_mask 0xb7, 2017-12-08, rev 0x200003c, size 27648 sig 0x00050662, pf_mask 0x10, 2017-12-16, rev 0x0014, size 31744 sig 0x00050663, pf_mask 0x10, 2017-12-16, rev 0x7000011, size 22528 sig 0x000506e3, pf_mask 0x36, 2017-11-16, rev 0x00c2, size 99328 sig 0x000706a1, pf_mask 0x01, 2017-12-26, rev 0x0022, size 73728 sig 0x000806e9, pf_mask 0xc0, 2018-01-04, rev 0x0080, size 98304 sig 0x000806ea, pf_mask 0xc0, 2018-01-04, rev 0x0080, size 98304 sig 0x000906e9, pf_mask 0x2a, 2018-01-04, rev 0x0080, size 98304 sig 0x000906ea, pf_mask 0x22, 2018-01-04, rev 0x0080, size 97280 sig 0x000906eb, pf_mask 0x02, 2018-01-04, rev 0x0080, size 98304 + Implements IBRS/IBPB support and enhances LFENCE: mitigation against Spectre (CVE-2017-5715) + Very likely fixes several other errata on some of the processors * supplementary-ucode-CVE-2017-5715.d/: remove. + Downgraded microcodes: sig 0x000406f1, pf_mask 0xef, 2017-03-01, rev 0xb000021, size 26624 sig 0x000506c9, pf_mask 0x03, 2017-03-25, rev 0x002c, size 16384 + This removes IBRS/IBPB support for these two platforms when compared with the previous (and unofficial) release, 20171215. We don't know why Intel declined to include these microcode updates (as well as several others) in the release. * source: remove superseded upstream data file: 20171117 * README.Debian, copyright: update download URLs (closes: #886368) -- Henrique de Moraes Holschuh <email address hidden> Wed, 10 Jan 2018 00:23:44 -0200
Available diffs
- diff from 3.20171117.1 to 3.20180108.1 (4.1 MiB)
- diff from 3.20171215.1 to 3.20180108.1 (4.1 MiB)
intel-microcode (3.20180108.0~ubuntu14.04.2) trusty-security; urgency=medium * Sync package to xenial's latest update * New upstream microcode datafile 20180108 + New Microcodes: sig 0x000506c9, pf_mask 0x03, 2017-03-25, rev 0x002c, size 16384 sig 0x000706a1, pf_mask 0x01, 2017-12-26, rev 0x0022, size 73728 sig 0x000906ea, pf_mask 0x22, 2018-01-04, rev 0x0080, size 97280 sig 0x000906eb, pf_mask 0x02, 2018-01-04, rev 0x0080, size 98304 + Updated Microcodes: sig 0x000306c3, pf_mask 0x32, 2017-11-20, rev 0x0023, size 23552 sig 0x000306d4, pf_mask 0xc0, 2017-11-17, rev 0x0028, size 18432 sig 0x000306e4, pf_mask 0xed, 2017-12-01, rev 0x042a, size 15360 sig 0x000306f2, pf_mask 0x6f, 2017-11-17, rev 0x003b, size 33792 sig 0x000306f4, pf_mask 0x80, 2017-11-17, rev 0x0010, size 17408 sig 0x00040651, pf_mask 0x72, 2017-11-20, rev 0x0021, size 22528 sig 0x00040661, pf_mask 0x32, 2017-11-20, rev 0x0018, size 25600 sig 0x00040671, pf_mask 0x22, 2017-11-17, rev 0x001b, size 13312 sig 0x000406e3, pf_mask 0xc0, 2017-11-16, rev 0x00c2, size 99328 sig 0x00050654, pf_mask 0xb7, 2017-12-08, rev 0x200003c, size 27648 sig 0x00050662, pf_mask 0x10, 2017-12-16, rev 0x0014, size 31744 sig 0x00050663, pf_mask 0x10, 2017-12-16, rev 0x7000011, size 22528 sig 0x000506e3, pf_mask 0x36, 2017-11-16, rev 0x00c2, size 99328 sig 0x000806e9, pf_mask 0xc0, 2018-01-04, rev 0x0080, size 98304 sig 0x000806ea, pf_mask 0xc0, 2018-01-04, rev 0x0080, size 98304 sig 0x000906e9, pf_mask 0x2a, 2018-01-04, rev 0x0080, size 98304 * source: remove unneeded intel-ucode/ directory * source: remove superseded upstream data file: 20170707 -- Marc Deslauriers <email address hidden> Tue, 09 Jan 2018 13:28:52 -0500
Available diffs
intel-microcode (3.20180108.0~ubuntu16.04.2) xenial-security; urgency=medium * New upstream microcode datafile 20180108 + New Microcodes: sig 0x000506c9, pf_mask 0x03, 2017-03-25, rev 0x002c, size 16384 sig 0x000706a1, pf_mask 0x01, 2017-12-26, rev 0x0022, size 73728 sig 0x000906ea, pf_mask 0x22, 2018-01-04, rev 0x0080, size 97280 sig 0x000906eb, pf_mask 0x02, 2018-01-04, rev 0x0080, size 98304 + Updated Microcodes: sig 0x000306c3, pf_mask 0x32, 2017-11-20, rev 0x0023, size 23552 sig 0x000306d4, pf_mask 0xc0, 2017-11-17, rev 0x0028, size 18432 sig 0x000306e4, pf_mask 0xed, 2017-12-01, rev 0x042a, size 15360 sig 0x000306f2, pf_mask 0x6f, 2017-11-17, rev 0x003b, size 33792 sig 0x000306f4, pf_mask 0x80, 2017-11-17, rev 0x0010, size 17408 sig 0x00040651, pf_mask 0x72, 2017-11-20, rev 0x0021, size 22528 sig 0x00040661, pf_mask 0x32, 2017-11-20, rev 0x0018, size 25600 sig 0x00040671, pf_mask 0x22, 2017-11-17, rev 0x001b, size 13312 sig 0x000406e3, pf_mask 0xc0, 2017-11-16, rev 0x00c2, size 99328 sig 0x00050654, pf_mask 0xb7, 2017-12-08, rev 0x200003c, size 27648 sig 0x00050662, pf_mask 0x10, 2017-12-16, rev 0x0014, size 31744 sig 0x00050663, pf_mask 0x10, 2017-12-16, rev 0x7000011, size 22528 sig 0x000506e3, pf_mask 0x36, 2017-11-16, rev 0x00c2, size 99328 sig 0x000806e9, pf_mask 0xc0, 2018-01-04, rev 0x0080, size 98304 sig 0x000806ea, pf_mask 0xc0, 2018-01-04, rev 0x0080, size 98304 sig 0x000906e9, pf_mask 0x2a, 2018-01-04, rev 0x0080, size 98304 * source: remove unneeded intel-ucode/ directory * source: remove superseded upstream data file: 20170707 -- Marc Deslauriers <email address hidden> Tue, 09 Jan 2018 13:28:52 -0500
Available diffs
intel-microcode (3.20180108.0~ubuntu17.04.1) zesty-security; urgency=medium * New upstream microcode datafile 20180108 + New Microcodes: sig 0x000506c9, pf_mask 0x03, 2017-03-25, rev 0x002c, size 16384 sig 0x000706a1, pf_mask 0x01, 2017-12-26, rev 0x0022, size 73728 sig 0x000906ea, pf_mask 0x22, 2018-01-04, rev 0x0080, size 97280 sig 0x000906eb, pf_mask 0x02, 2018-01-04, rev 0x0080, size 98304 + Updated Microcodes: sig 0x000306c3, pf_mask 0x32, 2017-11-20, rev 0x0023, size 23552 sig 0x000306d4, pf_mask 0xc0, 2017-11-17, rev 0x0028, size 18432 sig 0x000306e4, pf_mask 0xed, 2017-12-01, rev 0x042a, size 15360 sig 0x000306f2, pf_mask 0x6f, 2017-11-17, rev 0x003b, size 33792 sig 0x000306f4, pf_mask 0x80, 2017-11-17, rev 0x0010, size 17408 sig 0x00040651, pf_mask 0x72, 2017-11-20, rev 0x0021, size 22528 sig 0x00040661, pf_mask 0x32, 2017-11-20, rev 0x0018, size 25600 sig 0x00040671, pf_mask 0x22, 2017-11-17, rev 0x001b, size 13312 sig 0x000406e3, pf_mask 0xc0, 2017-11-16, rev 0x00c2, size 99328 sig 0x00050654, pf_mask 0xb7, 2017-12-08, rev 0x200003c, size 27648 sig 0x00050662, pf_mask 0x10, 2017-12-16, rev 0x0014, size 31744 sig 0x00050663, pf_mask 0x10, 2017-12-16, rev 0x7000011, size 22528 sig 0x000506e3, pf_mask 0x36, 2017-11-16, rev 0x00c2, size 99328 sig 0x000806e9, pf_mask 0xc0, 2018-01-04, rev 0x0080, size 98304 sig 0x000806ea, pf_mask 0xc0, 2018-01-04, rev 0x0080, size 98304 sig 0x000906e9, pf_mask 0x2a, 2018-01-04, rev 0x0080, size 98304 * source: remove unneeded intel-ucode/ directory * source: remove superseded upstream data file: 20170707 -- Marc Deslauriers <email address hidden> Tue, 09 Jan 2018 13:24:25 -0500
Available diffs
intel-microcode (3.20180108.0~ubuntu17.10.1) artful-security; urgency=medium * New upstream microcode datafile 20180108 + New Microcodes: sig 0x000506c9, pf_mask 0x03, 2017-03-25, rev 0x002c, size 16384 sig 0x000706a1, pf_mask 0x01, 2017-12-26, rev 0x0022, size 73728 sig 0x000906ea, pf_mask 0x22, 2018-01-04, rev 0x0080, size 97280 sig 0x000906eb, pf_mask 0x02, 2018-01-04, rev 0x0080, size 98304 + Updated Microcodes: sig 0x000306c3, pf_mask 0x32, 2017-11-20, rev 0x0023, size 23552 sig 0x000306d4, pf_mask 0xc0, 2017-11-17, rev 0x0028, size 18432 sig 0x000306e4, pf_mask 0xed, 2017-12-01, rev 0x042a, size 15360 sig 0x000306f2, pf_mask 0x6f, 2017-11-17, rev 0x003b, size 33792 sig 0x000306f4, pf_mask 0x80, 2017-11-17, rev 0x0010, size 17408 sig 0x00040651, pf_mask 0x72, 2017-11-20, rev 0x0021, size 22528 sig 0x00040661, pf_mask 0x32, 2017-11-20, rev 0x0018, size 25600 sig 0x00040671, pf_mask 0x22, 2017-11-17, rev 0x001b, size 13312 sig 0x000406e3, pf_mask 0xc0, 2017-11-16, rev 0x00c2, size 99328 sig 0x00050654, pf_mask 0xb7, 2017-12-08, rev 0x200003c, size 27648 sig 0x00050662, pf_mask 0x10, 2017-12-16, rev 0x0014, size 31744 sig 0x00050663, pf_mask 0x10, 2017-12-16, rev 0x7000011, size 22528 sig 0x000506e3, pf_mask 0x36, 2017-11-16, rev 0x00c2, size 99328 sig 0x000806e9, pf_mask 0xc0, 2018-01-04, rev 0x0080, size 98304 sig 0x000806ea, pf_mask 0xc0, 2018-01-04, rev 0x0080, size 98304 sig 0x000906e9, pf_mask 0x2a, 2018-01-04, rev 0x0080, size 98304 * source: remove unneeded intel-ucode/ directory * source: remove superseded upstream data file: 20170707 -- Marc Deslauriers <email address hidden> Tue, 09 Jan 2018 13:19:16 -0500
Available diffs
Superseded in bionic-proposed |
intel-microcode (3.20171215.1) unstable; urgency=high * Add supplementary-ucode-CVE-2017-5715.d/: (closes: #886367) New upstream microcodes to partially address CVE-2017-5715 + Updated Microcodes: sig 0x000306c3, pf_mask 0x32, 2017-11-20, rev 0x0023, size 23552 sig 0x000306d4, pf_mask 0xc0, 2017-11-17, rev 0x0028, size 18432 sig 0x000306f2, pf_mask 0x6f, 2017-11-17, rev 0x003b, size 33792 sig 0x00040651, pf_mask 0x72, 2017-11-20, rev 0x0021, size 22528 sig 0x000406e3, pf_mask 0xc0, 2017-11-16, rev 0x00c2, size 99328 sig 0x000406f1, pf_mask 0xef, 2017-11-18, rev 0xb000025, size 27648 sig 0x00050654, pf_mask 0xb7, 2017-11-21, rev 0x200003a, size 27648 sig 0x000506c9, pf_mask 0x03, 2017-11-22, rev 0x002e, size 16384 sig 0x000806e9, pf_mask 0xc0, 2017-12-03, rev 0x007c, size 98304 sig 0x000906e9, pf_mask 0x2a, 2017-12-03, rev 0x007c, size 98304 * Implements IBRS and IBPB support via new MSR (Spectre variant 2 mitigation, indirect branches). Support is exposed through cpuid(7).EDX. * LFENCE terminates all previous instructions (Spectre variant 2 mitigation, conditional branches). -- Henrique de Moraes Holschuh <email address hidden> Thu, 04 Jan 2018 23:04:38 -0200
Available diffs
- diff from 3.20171117.1 to 3.20171215.1 (1.1 KiB)
Superseded in bionic-release |
Superseded in bionic-release |
Deleted in bionic-proposed (Reason: moved to release) |
intel-microcode (3.20171117.1) unstable; urgency=medium * New upstream microcode data file 20171117 + New Microcodes: sig 0x000506c9, pf_mask 0x03, 2017-03-25, rev 0x002c, size 16384 sig 0x000706a1, pf_mask 0x01, 2017-10-31, rev 0x001e, size 72704 sig 0x000906ea, pf_mask 0x22, 2017-08-23, rev 0x0070, size 95232 sig 0x000906eb, pf_mask 0x02, 2017-09-20, rev 0x0072, size 97280 + Updated Microcodes: sig 0x00050654, pf_mask 0xb7, 2017-10-17, rev 0x2000035, size 26624 sig 0x000806ea, pf_mask 0xc0, 2017-08-03, rev 0x0070, size 96256 * source: remove superseded upstream data file: 20170707. * source: remove unneeded intel-ucode/ directory for 20171117. * debian/control: bump standards version to 4.1.1 (no changes) * Makefile: rename microcode-extras.pbin to microcode-includes.pbin. * README.source: fix IUC_EXCLUDE example and minor issues. * Makefile, README.souce: support loading ucode from directories. * debian/rules: switch to dh mode (debhelper v9) * ucode-blacklist: blacklist sig 0x406f1 (Skylake-X H0) from late loading. -- Henrique de Moraes Holschuh <email address hidden> Sat, 18 Nov 2017 18:55:09 -0200
Available diffs
- diff from 3.20170707.1 to 3.20171117.1 (3.7 MiB)
Superseded in zesty-updates |
Superseded in zesty-updates |
Deleted in zesty-proposed (Reason: moved to -updates) |
intel-microcode (3.20170707.1~ubuntu17.04.0) zesty; urgency=medium * Sync of new upstream microcode release to address Kaby Lake Hyper Threading bug. This is a sync of the dat files from artful version 3.20170707.1 (LP: #1700373) * New upstream microcode datafile 20170707 + New Microcodes: sig 0x00050654, pf_mask 0x97, 2017-06-01, rev 0x2000022, size 25600 sig 0x000806e9, pf_mask 0xc0, 2017-04-27, rev 0x0062, size 97280 sig 0x000806ea, pf_mask 0xc0, 2017-05-23, rev 0x0066, size 95232 sig 0x000906e9, pf_mask 0x2a, 2017-04-06, rev 0x005e, size 97280 + This release fixes the nightmare-level errata SKZ7/SKW144/SKL150/ SKX150 (Skylake) KBL095/KBW095 (Kaby Lake) for all affected Kaby Lake and Skylake processors: Skylake D0/R0 were fixed since the previous upstream release (20170511). This new release adds the fixes for Kaby Lake Y0/B0/H0 and Skylake H0 (Skylake-E/X). + Fix undisclosed errata in Skylake H0 (0x50654), Kaby Lake Y0 (0x806ea), Kaby Lake H0 (0x806e9), Kaby Lake B0 (0x906e9) * source: remove superseded upstream data file: 20170511 This brings dat files in sync with those shipped in Arful. * Updated Intel changelog and releasenote to reflect dat file sync. -- Dave Chiluk <email address hidden> Wed, 12 Jul 2017 21:26:17 -0500
Available diffs
Superseded in xenial-updates |
Superseded in xenial-updates |
Deleted in xenial-proposed (Reason: moved to -updates) |
intel-microcode (3.20170707.1~ubuntu16.04.0) xenial; urgency=medium * Sync of new upstream microcode release to address Skylake, Kaby Lake Hyper Threading bug. This is a sync of the dat files from artful version 3.20170707.1 (LP: #1700373) * New upstream microcode datafile 20170707 + New Microcodes: sig 0x00050654, pf_mask 0x97, 2017-06-01, rev 0x2000022, size 25600 sig 0x000806e9, pf_mask 0xc0, 2017-04-27, rev 0x0062, size 97280 sig 0x000806ea, pf_mask 0xc0, 2017-05-23, rev 0x0066, size 95232 sig 0x000906e9, pf_mask 0x2a, 2017-04-06, rev 0x005e, size 97280 + This release fixes the nightmare-level errata SKZ7/SKW144/SKL150/ SKX150 (Skylake) KBL095/KBW095 (Kaby Lake) for all affected Kaby Lake and Skylake processors: Skylake D0/R0 were fixed since the previous upstream release (20170511). This new release adds the fixes for Kaby Lake Y0/B0/H0 and Skylake H0 (Skylake-E/X). + Fix undisclosed errata in Skylake H0 (0x50654), Kaby Lake Y0 (0x806ea), Kaby Lake H0 (0x806e9), Kaby Lake B0 (0x906e9) * source: removed superseded upstream dat files: 20101123, 20151106 This brings dat files in sync with those shipped in Arful. * Updated Intel changelog to reflect dat file sync. -- Dave Chiluk <email address hidden> Wed, 12 Jul 2017 21:46:36 -0500
Available diffs
Superseded in artful-updates |
Superseded in artful-updates |
Superseded in bionic-release |
Obsolete in artful-release |
Deleted in artful-proposed (Reason: moved to release) |
intel-microcode (3.20170707.1) unstable; urgency=high * New upstream microcode datafile 20170707 + New Microcodes: sig 0x00050654, pf_mask 0x97, 2017-06-01, rev 0x2000022, size 25600 sig 0x000806e9, pf_mask 0xc0, 2017-04-27, rev 0x0062, size 97280 sig 0x000806ea, pf_mask 0xc0, 2017-05-23, rev 0x0066, size 95232 sig 0x000906e9, pf_mask 0x2a, 2017-04-06, rev 0x005e, size 97280 + This release fixes the nightmare-level errata SKZ7/SKW144/SKL150/ SKX150 (Skylake) KBL095/KBW095 (Kaby Lake) for all affected Kaby Lake and Skylake processors: Skylake D0/R0 were fixed since the previous upstream release (20170511). This new release adds the fixes for Kaby Lake Y0/B0/H0 and Skylake H0 (Skylake-E/X). + Fix undisclosed errata in Skylake H0 (0x50654), Kaby Lake Y0 (0x806ea), Kaby Lake H0 (0x806e9), Kaby Lake B0 (0x906e9) * source: remove unneeded intel-ucode/ directory * source: remove superseded upstream data file: 20170511 -- Henrique de Moraes Holschuh <email address hidden> Sat, 08 Jul 2017 19:04:27 -0300
Available diffs
- diff from 3.20170511.1 to 3.20170707.1 (2.9 MiB)
intel-microcode (3.20170511.1~ubuntu17.04.0) zesty; urgency=medium * Backport of new upstream microde release to address Hyper Threading bug. LP: #1700373.
Available diffs
intel-microcode (3.20170511.1) unstable; urgency=medium * New upstream microcode datafile 20170511 + Updated Microcodes: sig 0x000306c3, pf_mask 0x32, 2017-01-27, rev 0x0022, size 22528 sig 0x000306d4, pf_mask 0xc0, 2017-01-27, rev 0x0025, size 17408 sig 0x000306f2, pf_mask 0x6f, 2017-01-30, rev 0x003a, size 32768 sig 0x000306f4, pf_mask 0x80, 2017-01-30, rev 0x000f, size 16384 sig 0x00040651, pf_mask 0x72, 2017-01-27, rev 0x0020, size 20480 sig 0x00040661, pf_mask 0x32, 2017-01-27, rev 0x0017, size 24576 sig 0x00040671, pf_mask 0x22, 2017-01-27, rev 0x0017, size 11264 sig 0x000406e3, pf_mask 0xc0, 2017-04-09, rev 0x00ba, size 98304 sig 0x000406f1, pf_mask 0xef, 2017-03-01, rev 0xb000021, size 26624 sig 0x000506e3, pf_mask 0x36, 2017-04-09, rev 0x00ba, size 98304 + This release fixes undisclosed errata on the desktop, mobile and server processor models from the Haswell, Broadwell, and Skylake families, including even the high-end multi-socket server Xeons + Likely fix the TSC-Deadline LAPIC errata (BDF89, SKL142 and similar) on several processor families + Fix erratum BDF90 on Xeon E7v4, E5v4(?) (closes: #862606) + Likely fix serious or critical Skylake errata: SKL138/144, SKL137/145, SLK149 * Likely fix nightmare-level Skylake erratum SKL150. Fortunately, either this erratum is very-low-hitting, or gcc/clang/icc/msvc won't usually issue the affected opcode pattern and it ends up being rare. SKL150 - Short loops using both the AH/BH/CH/DH registers and the corresponding wide register *may* result in unpredictable system behavior. Requires both logical processors of the same core (i.e. sibling hyperthreads) to be active to trigger, as well as a "complex set of micro-architectural conditions" * source: remove unneeded intel-ucode/ directory Since release 20170511, upstream ships the microcodes both in .dat format, and as Linux-style split /lib/firmware/intel-ucode files. It is simpler to just use the .dat format file for now, so remove the intel-ucode/ directory. Note: before removal, it was verified that there were no discrepancies between the two microcode sets (.dat and intel-ucode/) * source: remove superseded upstream data file: 20161104 -- Henrique de Moraes Holschuh <email address hidden> Mon, 15 May 2017 15:12:25 -0300
Available diffs
- diff from 3.20161104.1 to 3.20170511.1 (2.5 MiB)
Superseded in artful-release |
Obsolete in zesty-release |
Deleted in zesty-proposed (Reason: moved to release) |
intel-microcode (3.20161104.1) unstable; urgency=medium * New upstream microcode datafile 20161104 + New Microcodes: sig 0x00050663, pf_mask 0x10, 2016-10-12, rev 0x700000d, size 20480 sig 0x00050664, pf_mask 0x10, 2016-06-02, rev 0xf00000a, size 21504 + Updated Microcodes: sig 0x000306f2, pf_mask 0x6f, 2016-10-07, rev 0x0039, size 32768 sig 0x000406f1, pf_mask 0xef, 2016-10-07, rev 0xb00001f, size 25600 + Removed Microcodes: sig 0x000106e4, pf_mask 0x09, 2013-07-01, rev 0x0003, size 6144 + This update fixes critical errata on Broadwell-DE V2/Y0 (Xeon D-1500 family), including one that can crash VMWare ESXi 6 with #PF (VMWare KB2146388), and could affect Linux as well. This same issue was fixed for the E5v4 Xeons in release 20160607 + This update fixes undisclosed (and likely critical) errata on Broadwell-E Core i7-68xxK/69xxK/6950X, Broadwell-EP/EX B0/R0/M0 Xeon E5v4 and Xeon E7v4, and Haswell-EP Xeon E5v3 + This release deletes the microcode update for the Jasper Forest embedded Xeons (Xeon EC35xx/LC35xx/EC35xx/LC55xx), for undisclosed reasons. The deleted microcode is outdated when compared with the updates for the other Nehalem Xeons * Makefile: always exclude microcode sig 0x206c2 just in case Intel is quite clear in the Intel SA-00030 advisory text that recent revisions (0x14 and later?) of the 0x206c2 microcode updates must be installed along with updated SINIT ACM on vPro systems (i.e. through an UEFI/BIOS firmware update). This is a defensive change so that we don't ship such a microcode update in the future by mistake * source: remove partially superseded upstream data file: 20160714 * source: remove superseded upstream data file: 20101123 * changelog: replace "pf mask" with "pf_mask" * control, compat: switch debhelper compatibility level to 9 * control: bump standards-version, no changes required -- Henrique de Moraes Holschuh <email address hidden> Wed, 09 Nov 2016 20:35:57 -0200
Available diffs
- diff from 3.20160714.1 to 3.20161104.1 (2.9 MiB)
Superseded in zesty-release |
Obsolete in yakkety-release |
Deleted in yakkety-proposed (Reason: moved to release) |
intel-microcode (3.20160714.1) unstable; urgency=medium * New upstream microcode datafile 20160714 + Updated Microcodes: sig 0x000306f4, pf mask 0x80, 2016-06-07, rev 0x000d, size 15360 sig 0x000406e3, pf mask 0xc0, 2016-06-22, rev 0x009e, size 97280 sig 0x000406f1, pf mask 0xef, 2016-06-06, rev 0xb00001d, size 25600 sig 0x000506e3, pf mask 0x36, 2016-06-22, rev 0x009e, size 97280 + This release hopefully fixes a hang when updating the microcode on some Skylake-U D-1/Skylake-Y D-1 (sig 0x406e3, pf 0x80) systems * source: remove superseded upstream data file: 20160607 -- Henrique de Moraes Holschuh <email address hidden> Thu, 21 Jul 2016 19:04:09 -0300
Available diffs
- diff from 3.20160607.2 to 3.20160714.1 (2.3 MiB)
intel-microcode (3.20160607.2) unstable; urgency=low * REMOVE microcode: sig 0x000406e3, pf mask 0xc0, 2016-04-06, rev 0x008a, size 96256 (closes: #828819) * The Core i7-6500U and m3-6Y30 processors (Skylake-UY D-1, sig=0x406e3, pf=0x80) may hang while attempting an early microcode update to revision 0x8a, apparently due to some sort of firmware dependency. On affected systems, the only way to avoid the issue is to get a firmware update that includes microcode revision 0x8a or later. At this time, there are reports of both sucessful and failed updates on the m3-6Y30, and only of failed updates on the i7-6500U. There are no reports about Skylake-U K-1 (pf=0x40). + WARNING: it is unsafe to use a system based on an Intel Skylake-U/Y processor with microcode earlier than revision 0x8a, due to several critical errata that cause unpredictable behavior, data corruption, and other problems. Users *must* update their firmware to get microcode 0x8a or newer, and keep it up-to-date. -- Henrique de Moraes Holschuh <email address hidden> Fri, 08 Jul 2016 22:54:26 -0300
Available diffs
- diff from 3.20160607.1 to 3.20160607.2 (1.2 KiB)
intel-microcode (3.20160607.1) unstable; urgency=medium * New upstream microcode data file 20160607 + New Microcodes: sig 0x000406e3, pf mask 0xc0, 2016-04-06, rev 0x008a, size 96256 sig 0x000406f1, pf mask 0xef, 2016-05-20, rev 0xb00001c, size 25600 sig 0x00050662, pf mask 0x10, 2015-12-12, rev 0x000f, size 28672 sig 0x000506e3, pf mask 0x36, 2016-04-06, rev 0x008a, size 96256 + Updated Microcodes: sig 0x000306c3, pf mask 0x32, 2016-03-16, rev 0x0020, size 22528 sig 0x000306d4, pf mask 0xc0, 2016-04-29, rev 0x0024, size 17408 sig 0x000306f2, pf mask 0x6f, 2016-03-28, rev 0x0038, size 32768 sig 0x000306f4, pf mask 0x80, 2016-02-11, rev 0x000a, size 15360 sig 0x00040651, pf mask 0x72, 2016-04-01, rev 0x001f, size 20480 sig 0x00040661, pf mask 0x32, 2016-04-01, rev 0x0016, size 24576 sig 0x00040671, pf mask 0x22, 2016-04-29, rev 0x0016, size 11264 * source: remove superseded upstream data file: 20151106. * control: change upstream URL to a search for "linux microcode" Unfortunately, many of the per-processor-model feeds have not been updated for microcode release 20160607. Switch to the general search page as the upstream URL. * README.Debian: fix duplicated word 'to' -- Henrique de Moraes Holschuh <email address hidden> Thu, 23 Jun 2016 12:17:03 -0300
Available diffs
- diff from 3.20151106.2 to 3.20160607.1 (2.0 MiB)
intel-microcode (3.20151106.2) unstable; urgency=medium * Makefile: make the build less verbose. * debian/changelog: fix error in past entry. Correct the version of the microcode that caused bug #776431, in the entry for version 3.20150121.1. * initramfs: don't force_load microcode.ko when missing. Detect a missing microcode.ko and don't attempt to force_load() it, otherwise we get spurious warnings at boot. In verbose mode, log the fact that the microcode driver is modular. For Linux 4.4 and later, skip the entire module loading logic, since the microcode driver cannot be modular for those kernels (closes: #814301). * initramfs: update copyright notice * initramfs: use iucode_tool -l for verbose mode * README.Debian: enhance and add recovery instructions. Rewrite large parts of the README.Debian document, and add recovery instructions (use of the "dis_ucode_ldr" kernel parameter). -- Henrique de Moraes Holschuh <email address hidden> Sun, 17 Apr 2016 12:38:12 -0300
Available diffs
- diff from 3.20151106.1 to 3.20151106.2 (6.6 KiB)
Superseded in yakkety-release |
Published in xenial-release |
Deleted in xenial-proposed (Reason: moved to release) |
intel-microcode (3.20151106.1) unstable; urgency=medium * New upstream microcode data file 20151106 + New Microcodes: sig 0x000306f4, pf mask 0x80, 2015-07-17, rev 0x0009, size 14336 sig 0x00040671, pf mask 0x22, 2015-08-03, rev 0x0013, size 11264 + Updated Microcodes: sig 0x000306a9, pf mask 0x12, 2015-02-26, rev 0x001c, size 12288 sig 0x000306c3, pf mask 0x32, 2015-08-13, rev 0x001e, size 21504 sig 0x000306d4, pf mask 0xc0, 2015-09-11, rev 0x0022, size 16384 sig 0x000306f2, pf mask 0x6f, 2015-08-10, rev 0x0036, size 30720 sig 0x00040651, pf mask 0x72, 2015-08-13, rev 0x001d, size 20480 * This massive Haswell + Broadwell (and related Xeons) update fixes several critical errata, including the high-hitting BDD86/BDM101/ HSM153(?) which triggers an MCE and locks the processor core (LP: #1509764) * Might fix critical errata BDD51, BDM53 (TSX-related) * source: remove superseded upstream data file: 20150121 * Add support for supplementary microcode bundles: + README.source: update and mention supplementary microcode + Makefile: support supplementary microcode Add support for supplementary microcode bundles, which (unlike .fw microcode override files) can be superseded by a higher revision microcode from the latest regular microcode bundle. Also, fix the "oldies" target to have its own exclude filter (IUC_OLDIES_EXCLUDE) * Add support for x32 arch: + README.source: mention x32 + control,rules: enable building on x32 arch (Closes: #777356) * ucode-blacklist: add Broadwell and Haswell-E signatures Add a missing signature for Haswell Refresh (Haswell-E) to the "must be updated only by the early microcode update driver" list. There is at least one report of one of the Broadwell microcode updates disabling TSX-NI, so add them as well just in case -- Henrique de Moraes Holschuh <email address hidden> Mon, 09 Nov 2015 23:07:32 -0200
Available diffs
- diff from 3.20150121.1 to 3.20151106.1 (1.7 MiB)
Superseded in xenial-release |
Obsolete in wily-release |
Obsolete in vivid-release |
Deleted in vivid-proposed (Reason: moved to release) |
intel-microcode (3.20150121.1) unstable; urgency=critical * New upstream microcode data file 20150121 * Downgraded microcodes (to a previously shipped revision): sig 0x000306f2, pf mask 0x6f, 2014-09-03, rev 0x0029, size 28672 * The microcode downgrade fixes a very nasty regression on Xeon E5v3 processors (closes: #776431) * critical urgency: the broken sig 0x306f2, rev 0x2b microcode shipped in release 20150107 caused CPU core hangs and Linux boot failures. The upstream fix was to downgrade it to the same microcode revision that was shipped in release 20140913 * source: remove superseded upstream data file: 20150107. * initramfs.hook: do not mix arrays and lists. Avoid echo "foo $@", use echo "foo $*" instead. This is unlikely to be expĺoitable, but it makes ShellCheck happier. -- Henrique de Moraes Holschuh <email address hidden> Wed, 28 Jan 2015 20:03:20 -0200
Available diffs
- diff from 3.20150107.1 to 3.20150121.1 (1.6 MiB)
intel-microcode (3.20150107.1) unstable; urgency=high * New upstream microcode data file 20150107 + New Microcodes: sig 0x000306d4, pf mask 0xc0, 2014-12-05, rev 0x0018, size 14336 + Updated Microcodes: sig 0x000306f2, pf mask 0x6f, 2014-11-21, rev 0x002d, size 28672 + High urgency: there are fast-tracked microcode updates in this release which imply that critical errata are being fixed * source: remove superseded upstream data file: 20140913 -- Henrique de Moraes Holschuh <email address hidden> Sun, 18 Jan 2015 00:30:11 -0200
Available diffs
- diff from 3.20140913.1 to 3.20150107.1 (1.6 MiB)
Superseded in vivid-release |
Superseded in vivid-release |
Superseded in vivid-release |
Deleted in vivid-proposed (Reason: moved to release) |
intel-microcode (3.20140913.1) unstable; urgency=low * New upstream microcode data file 20140913 + New Microcodes: sig 0x000306f2, pf mask 0x6f, 2014-09-03, rev 0x0029, size 28672 + Updated Microcodes: sig 0x000306c3, pf mask 0x32, 2014-07-03, rev 0x001c, size 21504 sig 0x00040651, pf mask 0x72, 2014-07-03, rev 0x001c, size 20480 sig 0x00040661, pf mask 0x32, 2014-07-03, rev 0x0012, size 23552 + WARNING: UNSAFE TO BE APPLIED AT RUNTIME (lp#1370352) * Microcode updates are now applied only through the early initramfs + Bump major version number + Requires Linux kernel v3.10 or later, other kernels unsupported + postinst: don't apply microcode update + kernel preinst: stop loading microcode module + modprobe.d: blacklist microcode module from autoloading outside of the initramfs. Still load it inside the initramfs for logging + initramfs: always use early initramfs mode, reject kernels before v3.10 + README.Debian, NEWS.Debian: update * add a microcode best-effort blacklist. This is a reactive blacklist which renames problematic microcode data files in such a way they will only be used for the [early] initramfs. Use it to blacklist all Haswell microcode updates * Allow a non-Intel box to generate an early initramfs with microcode for an Intel box if the /etc/default/intel-microcode defaults are changed: + postinst: always attempt to update the initramfs + initramfs: on auto mode, do nothing in a non-intel box. In forced "early" mode, attempt to run iucode-tool. This will do nothing (add no microcode) unless the default configuration is changed in /etc/default/intel-microcode + default: update comments * source: remove superseded upstream data file: 20140624 * README.source: remove information about lenny, oldstable * debian/control: bump standards vesion to 3.9.6 * lintian-overrides: remove * debian/copyright: update upstream copyright dates * postrm: avoid use of test -a -- Henrique de Moraes Holschuh <email address hidden> Sun, 19 Oct 2014 15:23:13 -0200
Available diffs
Superseded in vivid-release |
Obsolete in utopic-release |
Deleted in utopic-proposed (Reason: moved to release) |
intel-microcode (2.20140913.1ubuntu2) utopic; urgency=medium * It appears microcode-20140913.dat introduced regressions(s) https://bugs.launchpad.net/intel/+bug/1370352/comments/3 Deleted microcode-20140913.dat -LP: #1370352 -- Tim Gardner <email address hidden> Wed, 17 Sep 2014 12:26:59 -0600
Available diffs
Deleted in trusty-proposed (Reason: Removal due to regression (LP: #1370352)) |
intel-microcode (2.20140913-t-1ubuntu1) trusty; urgency=medium * Fixes for Haswell platforms New upstream data file: microcode-20140913.dat -LP: #1370352 -- Tim Gardner <email address hidden> Wed, 17 Sep 2014 09:40:33 -0600
Available diffs
intel-microcode (2.20140913.1ubuntu1) utopic; urgency=medium * Fixes for Haswell platforms -LP: #1370352 -- Tim Gardner <email address hidden> Wed, 17 Sep 2014 08:03:41 -0600
Available diffs
76 → 150 of 187 results | First • Previous • Next • Last |